Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DO9uvdGMde.exe

Overview

General Information

Sample name:DO9uvdGMde.exe
renamed because original name is a hash value
Original sample name:9ea0a0d830d560e34c04870341fac3631ded5d423ec8104fe3d56b62ff0668ac.exe
Analysis ID:1504107
MD5:0ce8f39e540c12f1fb211f830b29d089
SHA1:ab1ad00d47f2c0ef73713d5b8b3dcd2ec5fd71e4
SHA256:9ea0a0d830d560e34c04870341fac3631ded5d423ec8104fe3d56b62ff0668ac
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copy file to startup via Powershell
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
Contains functionality to log keystrokes (.Net Source)
Creates executable files without a name
Drops PE files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Outbound SMTP Connections
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DO9uvdGMde.exe (PID: 6392 cmdline: "C:\Users\user\Desktop\DO9uvdGMde.exe" MD5: 0CE8F39E540C12F1FB211F830B29D089)
    • powershell.exe (PID: 5040 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • DO9uvdGMde.exe (PID: 3236 cmdline: "C:\Users\user\Desktop\DO9uvdGMde.exe" MD5: 0CE8F39E540C12F1FB211F830B29D089)
  • svchost.exe (PID: 7000 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • .exe (PID: 5260 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" MD5: 0CE8F39E540C12F1FB211F830B29D089)
    • powershell.exe (PID: 5500 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • .exe (PID: 1464 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" MD5: 0CE8F39E540C12F1FB211F830B29D089)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3370082204.000000000231C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.2.DO9uvdGMde.exe.3ec0e10.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.DO9uvdGMde.exe.3ec0e10.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.DO9uvdGMde.exe.3ec0e10.2.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316e5:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31757:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317e1:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31873:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318dd:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3194f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319e5:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a75:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.DO9uvdGMde.exe.3efb840.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.DO9uvdGMde.exe.3efb840.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: frack113: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DO9uvdGMde.exe", ParentImage: C:\Users\user\Desktop\DO9uvdGMde.exe, ParentProcessId: 6392, ParentProcessName: DO9uvdGMde.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 5040, ProcessName: powershell.exe
                    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5040, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                    Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5040, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.54.122.135, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\DO9uvdGMde.exe, Initiated: true, ProcessId: 3236, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49713
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DO9uvdGMde.exe", ParentImage: C:\Users\user\Desktop\DO9uvdGMde.exe, ParentProcessId: 6392, ParentProcessName: DO9uvdGMde.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 5040, ProcessName: powershell.exe
                    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7000, ProcessName: svchost.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DO9uvdGMde.exe", ParentImage: C:\Users\user\Desktop\DO9uvdGMde.exe, ParentProcessId: 6392, ParentProcessName: DO9uvdGMde.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 5040, ProcessName: powershell.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeReversingLabs: Detection: 65%
                    Source: DO9uvdGMde.exeReversingLabs: Detection: 65%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJoe Sandbox ML: detected
                    Source: DO9uvdGMde.exeJoe Sandbox ML: detected
                    Source: DO9uvdGMde.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49712 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49719 version: TLS 1.2
                    Source: DO9uvdGMde.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: DO9uvdGMde.exe, 00000000.00000002.2136730282.00000000056C0000.00000004.08000000.00040000.00000000.sdmp, DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000006.00000002.2265452072.0000000002591000.00000004.00000800.00020000.00000000.sdmp
                    Source: global trafficTCP traffic: 192.168.2.6:49713 -> 198.54.122.135:587
                    Source: Joe Sandbox ViewIP Address: 198.54.122.135 198.54.122.135
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.6:49713 -> 198.54.122.135:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.privateemail.com
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3368027736.0000019145ACE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2250863931.00000000030EC000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3385871309.0000000006BB2000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3368571811.0000000001516000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: svchost.exe, 00000005.00000002.3368027736.0000019145ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                    Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                    Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                    Source: DO9uvdGMde.exe, 00000000.00000002.2129809023.0000000001109000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.000000000231C000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.000000000323C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.privateemail.com
                    Source: powershell.exe, 00000002.00000002.2131924595.0000000005D0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                    Source: powershell.exe, 00000007.00000002.2252453666.0000000004D52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000002.00000002.2118630596.0000000004CA1000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2252453666.0000000004C01000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000007.00000002.2252453666.0000000004D52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: DO9uvdGMde.exe, 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3366013811.0000000000436000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: powershell.exe, 00000002.00000002.2118630596.0000000004CA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2252453666.0000000004C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                    Source: DO9uvdGMde.exe, 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3366013811.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                    Source: svchost.exe, 00000005.00000003.2130371833.000001914B200000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                    Source: powershell.exe, 00000007.00000002.2252453666.0000000004D52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000002.00000002.2131924595.0000000005D0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: .exe, 00000006.00000002.2263371366.0000000000A07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wdcp.mi
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49712 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49719 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, SKTzxzsJw.cs.Net Code: mWXy4
                    Source: 0.2.DO9uvdGMde.exe.3ec0e10.2.raw.unpack, SKTzxzsJw.cs.Net Code: mWXy4

                    System Summary

                    barindex
                    Source: 0.2.DO9uvdGMde.exe.3ec0e10.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.DO9uvdGMde.exe.3ec0e10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.DO9uvdGMde.exe.3de2570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file
                    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 0_2_02D1D3DC0_2_02D1D3DC
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_0094A9604_2_0094A960
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_00944A984_2_00944A98
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_0094DBE04_2_0094DBE0
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_00943E804_2_00943E80
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_009441C84_2_009441C8
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F845704_2_05F84570
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F835204_2_05F83520
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F85D084_2_05F85D08
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F83C804_2_05F83C80
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F891C04_2_05F891C0
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F8A1084_2_05F8A108
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F8E0984_2_05F8E098
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F803084_2_05F80308
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F856284_2_05F85628
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_05F8C3284_2_05F8C328
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 6_2_0095D3DC6_2_0095D3DC
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_0307B3C89_2_0307B3C8
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_03074A989_2_03074A98
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_03073E809_2_03073E80
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_0307DCA89_2_0307DCA8
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_030741C89_2_030741C8
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC0FE09_2_06DC0FE0
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC3C6B9_2_06DC3C6B
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC45709_2_06DC4570
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC5D089_2_06DC5D08
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC35209_2_06DC3520
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC91B09_2_06DC91B0
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DCA1089_2_06DCA108
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DC56289_2_06DC5628
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06DCC3289_2_06DCC328
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06F1A0689_2_06F1A068
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06F1B9009_2_06F1B900
                    Source: DO9uvdGMde.exe, 00000000.00000002.2136206395.0000000005610000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2129809023.00000000010CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000000.2106990287.00000000009EC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInterlop.exe2 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea405aee0-8989-4d2f-871d-52e1f783cbe2.exe4 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2136730282.00000000056C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea405aee0-8989-4d2f-871d-52e1f783cbe2.exe4 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\000004B0\\OriginalFilename vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000004.00000002.3366188626.0000000000537000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea405aee0-8989-4d2f-871d-52e1f783cbe2.exe4 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exe, 00000004.00000002.3366095373.00000000004F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exeBinary or memory string: OriginalFilenameInterlop.exe2 vs DO9uvdGMde.exe
                    Source: DO9uvdGMde.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.DO9uvdGMde.exe.3ec0e10.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DO9uvdGMde.exe.3ec0e10.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DO9uvdGMde.exe.3de2570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.DO9uvdGMde.exe.5610000.5.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
                    Source: 0.2.DO9uvdGMde.exe.3de2570.4.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
                    Source: classification engineClassification label: mal100.spre.troj.adwa.spyw.evad.winEXE@13/11@2/3
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2888:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4340:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fjxiqozw.dp0.ps1Jump to behavior
                    Source: DO9uvdGMde.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: DO9uvdGMde.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: DO9uvdGMde.exeReversingLabs: Detection: 65%
                    Source: unknownProcess created: C:\Users\user\Desktop\DO9uvdGMde.exe "C:\Users\user\Desktop\DO9uvdGMde.exe"
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Users\user\Desktop\DO9uvdGMde.exe "C:\Users\user\Desktop\DO9uvdGMde.exe"
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Users\user\Desktop\DO9uvdGMde.exe "C:\Users\user\Desktop\DO9uvdGMde.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: DO9uvdGMde.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: DO9uvdGMde.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: DO9uvdGMde.exe, 00000000.00000002.2136730282.00000000056C0000.00000004.08000000.00040000.00000000.sdmp, DO9uvdGMde.exe, 00000000.00000002.2133513926.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000006.00000002.2265452072.0000000002591000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: DO9uvdGMde.exe, --.cs.Net Code: CreateProvider
                    Source: .exe.2.dr, --.cs.Net Code: CreateProvider
                    Source: DO9uvdGMde.exeStatic PE information: 0xBA207775 [Fri Dec 14 05:51:49 2068 UTC]
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_00940CCC push edi; retf 4_2_00940C7A
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeCode function: 4_2_00940C45 push ebx; retf 4_2_00940C52
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04BD6C70 push F4086279h; ret 7_2_04BD6E8D
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04BD17C3 pushad ; iretd 7_2_04BD1842
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04BD7188 push ss; iretd 7_2_04BD7192
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04BD1C7B pushad ; iretd 7_2_04BD1C8A
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04BD1C6B pushad ; iretd 7_2_04BD1C7A
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_07903932 push esi; retf 7_2_07903933
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_03070C45 push ebx; retf 9_2_03070C52
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_03070C77 push edi; retf 9_2_03070C7A
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 9_2_06F1FCBC push es; retf 9_2_06F1FCC8
                    Source: DO9uvdGMde.exeStatic PE information: section name: .text entropy: 7.35517204613953
                    Source: .exe.2.drStatic PE information: section name: .text entropy: 7.35517204613953

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe\:Zone.Identifier:$DATAJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 6392, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: 940000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: 22A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: 42A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 2590000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: C00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 15E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3206Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWindow / User API: threadDelayed 2149Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWindow / User API: threadDelayed 7221Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4551Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1104Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWindow / User API: threadDelayed 1760Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWindow / User API: threadDelayed 5052Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 5880Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4196Thread sleep count: 3206 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6792Thread sleep count: 284 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1464Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6916Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep count: 32 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 3688Thread sleep count: 2149 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 3688Thread sleep count: 7221 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99662s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99499s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99388s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99201s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -99093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98874s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98542s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98436s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -98109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97999s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97123s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -97015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96868s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96625s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96499s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96390s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96281s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96171s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -96062s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95943s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95374s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -95046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -94937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -94828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -94718s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -94608s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exe TID: 6400Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exe TID: 6776Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 5880Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2084Thread sleep count: 4551 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5648Thread sleep count: 1104 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3084Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7284Thread sleep count: 1760 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7284Thread sleep count: 5052 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99669s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99560s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99452s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99331s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99187s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -99021s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98903s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98797s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98467s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98140s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97920s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97593s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97484s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97375s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97265s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97156s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -97046s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96910s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96718s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96435s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96328s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -96000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -95889s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -95780s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7280Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99662Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99499Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99388Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99201Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 99093Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98874Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98765Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98542Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98436Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98218Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97999Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97781Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97671Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97562Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97453Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97343Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97234Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97123Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 97015Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96868Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96625Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96499Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96390Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96281Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96171Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 96062Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95943Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95812Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95703Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95593Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95484Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95374Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95265Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95156Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 95046Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 94937Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 94828Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 94718Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 94608Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99669Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99560Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99452Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99331Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99187Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 99021Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98903Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98467Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98140Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97920Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97593Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97375Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 97046Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96910Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96718Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96435Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 96000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 95889Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 95780Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: svchost.exe, 00000005.00000002.3368908104.0000019147059000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3367205403.0000019145A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3368867777.0000019147047000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: .exe, 00000009.00000002.3368571811.0000000001516000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf
                    Source: DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, zOS.csReference to suspicious API methods: _120HqGy.OpenProcess(_2pIt.DuplicateHandle, bInheritHandle: true, (uint)iVE.ProcessID)
                    Source: 0.2.DO9uvdGMde.exe.56c0000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                    Source: 0.2.DO9uvdGMde.exe.56c0000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                    Source: 0.2.DO9uvdGMde.exe.56c0000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeMemory written: C:\Users\user\Desktop\DO9uvdGMde.exe base: 500000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeProcess created: C:\Users\user\Desktop\DO9uvdGMde.exe "C:\Users\user\Desktop\DO9uvdGMde.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Users\user\Desktop\DO9uvdGMde.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Users\user\Desktop\DO9uvdGMde.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3ec0e10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3efb840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3ec0e10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3de2570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3370082204.000000000231C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.0000000003211000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 6392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 3236, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: .exe PID: 1464, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\DO9uvdGMde.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3ec0e10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3efb840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3ec0e10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3de2570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.0000000003211000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3366188626.0000000000537000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 6392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 3236, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: .exe PID: 1464, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3ec0e10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3efb840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3efb840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3ec0e10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DO9uvdGMde.exe.3de2570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3370082204.000000000231C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.0000000003211000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3369881312.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 6392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DO9uvdGMde.exe PID: 3236, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: .exe PID: 1464, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    12
                    Registry Run Keys / Startup Folder
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    34
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts2
                    PowerShell
                    Logon Script (Windows)12
                    Registry Run Keys / Startup Folder
                    21
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Software Packing
                    NTDS221
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials151
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                    Masquerading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job151
                    Virtualization/Sandbox Evasion
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1504107 Sample: DO9uvdGMde.exe Startdate: 04/09/2024 Architecture: WINDOWS Score: 100 35 mail.privateemail.com 2->35 37 api.ipify.org 2->37 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 Multi AV Scanner detection for dropped file 2->63 65 11 other signatures 2->65 8 DO9uvdGMde.exe 2 2->8         started        11 .exe 2 2->11         started        13 svchost.exe 1 1 2->13         started        signatures3 process4 dnsIp5 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->67 69 Bypasses PowerShell execution policy 8->69 71 Injects a PE file into a foreign processes 8->71 16 powershell.exe 13 8->16         started        20 DO9uvdGMde.exe 15 2 8->20         started        23 .exe 14 2 11->23         started        25 powershell.exe 11 11->25         started        43 127.0.0.1 unknown unknown 13->43 signatures6 process7 dnsIp8 31 C:\Users\user\AppData\Roaming\...\.exe, PE32 16->31 dropped 33 C:\Users\user\...\.exe:Zone.Identifier, ASCII 16->33 dropped 45 Creates executable files without a name 16->45 47 Drops PE files to the startup folder 16->47 49 Powershell drops PE file 16->49 27 conhost.exe 16->27         started        39 mail.privateemail.com 198.54.122.135, 49713, 49720, 587 NAMECHEAP-NETUS United States 20->39 41 api.ipify.org 104.26.13.205, 443, 49712, 49719 CLOUDFLARENETUS United States 20->41 51 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->51 53 Tries to steal Mail credentials (via file / registry access) 23->53 55 Tries to harvest and steal ftp login credentials 23->55 57 Tries to harvest and steal browser information (history, passwords, etc) 23->57 29 conhost.exe 25->29         started        file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DO9uvdGMde.exe66%ReversingLabsWin32.Spyware.Negasteal
                    DO9uvdGMde.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe66%ReversingLabsWin32.Spyware.Negasteal
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://g.live.com/odclientsettings/Prod1C:0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    https://aka.ms/pscore6lB0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    https://g.live.com/odclientsettings/ProdV21C:0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                    http://mail.privateemail.com0%Avira URL Cloudsafe
                    http://crl.ver)0%Avira URL Cloudsafe
                    https://wdcp.mi0%Avira URL Cloudsafe
                    https://github.com/Pester/Pester0%Avira URL Cloudsafe
                    http://go.mic0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.privateemail.com
                    198.54.122.135
                    truetrue
                      unknown
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2131924595.0000000005D0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.orgDO9uvdGMde.exe, 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3366013811.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://g.live.com/odclientsettings/Prod1C:edb.log.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/DO9uvdGMde.exe, 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3366013811.0000000000436000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0DO9uvdGMde.exe, 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3367383037.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000009.00000002.3367193234.000000000150D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.2252453666.0000000004D52000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2118630596.0000000004CA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2252453666.0000000004C01000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.2252453666.0000000004D52000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contoso.com/powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2131924595.0000000005D0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contoso.com/Licensepowershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contoso.com/Iconpowershell.exe, 00000007.00000002.2268478290.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000005.00000003.2130371833.000001914B200000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.ver)svchost.exe, 00000005.00000002.3368027736.0000019145ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://wdcp.mi.exe, 00000006.00000002.2263371366.0000000000A07000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.org/tDO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.privateemail.comDO9uvdGMde.exe, 00000004.00000002.3370082204.000000000231C000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.000000000323C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2118630596.0000000004CA1000.00000004.00000800.00020000.00000000.sdmp, DO9uvdGMde.exe, 00000004.00000002.3370082204.00000000022A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2252453666.0000000004C01000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000009.00000002.3369881312.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.2252453666.0000000004D52000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://go.micDO9uvdGMde.exe, 00000000.00000002.2129809023.0000000001109000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        198.54.122.135
                        mail.privateemail.comUnited States
                        22612NAMECHEAP-NETUStrue
                        104.26.13.205
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        IP
                        127.0.0.1
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1504107
                        Start date and time:2024-09-04 14:50:10 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 49s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:14
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:DO9uvdGMde.exe
                        renamed because original name is a hash value
                        Original Sample Name:9ea0a0d830d560e34c04870341fac3631ded5d423ec8104fe3d56b62ff0668ac.exe
                        Detection:MAL
                        Classification:mal100.spre.troj.adwa.spyw.evad.winEXE@13/11@2/3
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 176
                        • Number of non-executed functions: 3
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded IPs from analysis (whitelisted): 184.28.90.27
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target powershell.exe, PID 5040 because it is empty
                        • Execution Graph export aborted for target powershell.exe, PID 5500 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: DO9uvdGMde.exe
                        TimeTypeDescription
                        08:50:59API Interceptor48x Sleep call for process: DO9uvdGMde.exe modified
                        08:51:00API Interceptor5x Sleep call for process: powershell.exe modified
                        08:51:01API Interceptor2x Sleep call for process: svchost.exe modified
                        08:51:13API Interceptor37x Sleep call for process: .exe modified
                        14:51:04AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        198.54.122.1354dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                          SecuriteInfo.com.W32.MSIL_Kryptik.KUK.gen.Eldorado.13479.2252.exeGet hashmaliciousAgentTeslaBrowse
                            IMPORT PO2024-0961 ASTG.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                Solicitud de precio Img_Quotation PO 202400931.exeGet hashmaliciousAgentTeslaBrowse
                                  PO N#U00b0202415-0004 CULTER-ASSOCIETES_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTeslaBrowse
                                      img_Zam#U00f3wienie - #20240716-A09461_pdf.com.exeGet hashmaliciousAgentTeslaBrowse
                                        Zam#U00f3wienie - #20240715-A09461_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            104.26.13.205fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                            • api.ipify.org/
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • api.ipify.org/
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • api.ipify.org/
                                            SecuriteInfo.com.Win64.Evo-gen.28044.10443.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                                            • api.ipify.org/
                                            golang-modules.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            SecuriteInfo.com.Trojan.Win64.Agent.14415.19839.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                            • api.ipify.org/?format=wef
                                            Ransom.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                            • api.ipify.org/
                                            ld.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                            • api.ipify.org/
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.privateemail.com4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                            • 198.54.122.135
                                            SecuriteInfo.com.W32.MSIL_Kryptik.KUK.gen.Eldorado.13479.2252.exeGet hashmaliciousAgentTeslaBrowse
                                            • 198.54.122.135
                                            IMPORT PO2024-0961 ASTG.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • 198.54.122.135
                                            RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • 198.54.122.135
                                            Solicitud de precio Img_Quotation PO 202400931.exeGet hashmaliciousAgentTeslaBrowse
                                            • 198.54.122.135
                                            PO N#U00b0202415-0004 CULTER-ASSOCIETES_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 198.54.122.135
                                            RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTeslaBrowse
                                            • 198.54.122.135
                                            img_Zam#U00f3wienie - #20240716-A09461_pdf.com.exeGet hashmaliciousAgentTeslaBrowse
                                            • 198.54.122.135
                                            Zam#U00f3wienie - #20240715-A09461_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 198.54.122.135
                                            RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            • 198.54.122.135
                                            api.ipify.orgfsqmM6GK7v.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            z17invoice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            Payment Confirmation Documents.vbeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            po89654.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            EVER V-2408 - VESSEL DETAILS.xlsx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            CSC LEADER VOY.1 PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            http://ipfs.io/ipns/k51qzi5uqu5dhrye4cl9jgj17k94vzpzjxfa8oougs30gvfbtzu2d60vboy90pGet hashmaliciousHTMLPhisherBrowse
                                            • 104.26.12.205
                                            JAE-2408001146..exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            https://bergtool-my.sharepoint.com/:f:/p/officemgr/EkAEY_TxWUpGjuhgV5jRSO8BD2acB1HjNb72Far_j2tXBg?e=T7fVyKGet hashmaliciousEvilProxyBrowse
                                            • 104.26.13.205
                                            Inquiry PDA (S.S. Pacific Enlighten)_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSfsqmM6GK7v.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            9DP4y36Dlu.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.97.3
                                            QZyFrUDVA9.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.10.3
                                            http://accounts.aptia365.comGet hashmaliciousUnknownBrowse
                                            • 104.17.31.174
                                            4wx72yFLka.exeGet hashmaliciousPython Stealer, CStealer, ChaosBrowse
                                            • 104.26.3.16
                                            9DP4y36Dlu.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            0U9NY2PzhK.exeGet hashmaliciousPython Stealer, CStealer, ChaosBrowse
                                            • 172.67.75.40
                                            icTynpKakZ.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.11.3
                                            qlk8old6p9.exeGet hashmaliciousPython Stealer, CStealer, ChaosBrowse
                                            • 172.67.75.40
                                            04-09.htmGet hashmaliciousUnknownBrowse
                                            • 104.17.25.14
                                            NAMECHEAP-NETUShttps://www.google.com/url?q=https://google.com/url?hl%3Den%26q%3Dhttps://google.com/url?q%3DJFt7SBpfnkz37NXTPycl%26rct%3DecYm4gDyqlWjNVTtaSh7%26sa%3Dt%26esrc%3DyN3TRjFzCWurgbW1vOG4%26source%3DzcMGnUNgngXYWBYW2c3r%26cd%3DqBH0Ch4Gn8VGtKfHcUPR%26cad%3D0q4c3js52qUrSH6rI5Ux%26ved%3DxpZpiH8kwVo72kkPvwUH%26uact%3DhzYhur4iRKYoiuCfwC6s%26url%3Damp%252Fareaazul.com.mx%252F.beans%252F&source=gmail&ust=1725454484963000&usg=AOvVaw2xy0LT_ByjSLCoEqCzpyxV#e3YsAE-SURELILYZmFiM3NtcF9wY0BnbG9iYWxmb3VuZHJpZXMuY29tGet hashmaliciousHTMLPhisherBrowse
                                            • 198.54.114.158
                                            https://urlz.fr/rXqtGet hashmaliciousUnknownBrowse
                                            • 63.250.43.13
                                            https://fvrihg-f42780.ingress-daribow.ewp.live/wp-content/plugins/sdnww/pages/region.phpGet hashmaliciousUnknownBrowse
                                            • 63.250.43.14
                                            https://www.facebook-web.qatara.org/Get hashmaliciousUnknownBrowse
                                            • 199.188.200.104
                                            https://facebook-web.qatara.org/Get hashmaliciousUnknownBrowse
                                            • 199.188.200.104
                                            https://urlz.fr/rYuEGet hashmaliciousUnknownBrowse
                                            • 63.250.43.129
                                            https://ventra-f1bc7c.ingress-earth.ewp.live/wp-content/plugins/nwcalink/pages/region.phpGet hashmaliciousUnknownBrowse
                                            • 63.250.43.129
                                            https://ventra-f1bc7c.ingress-earth.ewp.live/wp-content/plugins/nwcalink/Get hashmaliciousUnknownBrowse
                                            • 63.250.43.129
                                            file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                            • 198.54.120.231
                                            file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                            • 198.54.120.231
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0efsqmM6GK7v.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            9DP4y36Dlu.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            yuwPQpck2K.exeGet hashmaliciousPureLog Stealer, WhiteSnake Stealer, zgRATBrowse
                                            • 104.26.13.205
                                            9DP4y36Dlu.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            Dropper.batGet hashmaliciousLockBit ransomwareBrowse
                                            • 104.26.13.205
                                            PO0004092024.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 104.26.13.205
                                            uxMCGUELJd.exeGet hashmaliciousZorabBrowse
                                            • 104.26.13.205
                                            rDocumentPurchaseOrder202998.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 104.26.13.205
                                            z17invoice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            uxMCGUELJd.exeGet hashmaliciousZorabBrowse
                                            • 104.26.13.205
                                            No context
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1310720
                                            Entropy (8bit):0.726307331501471
                                            Encrypted:false
                                            SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0L:9JZj5MiKNnNhoxu+
                                            MD5:365A730627BD19D7ABF626DACBF8214C
                                            SHA1:431A6D9BD9969B6B48742A21B9CC2F34E3638AF3
                                            SHA-256:B2E4A3194D69BD108B3E8B633C8B821364BAFB1C9181004C0EC0F1A3C05163B2
                                            SHA-512:5D8966CA05FC69045DFF2804D904FBDEA1A20FFD6EBD21ADFE767307E46204C8BED39F5F02C7DB414BF119979BF4EA6759ACE6594FA13E2C147EA9805D21E0D4
                                            Malicious:false
                                            Reputation:low
                                            Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:Extensible storage user DataBase, version 0x620, checksum 0x9d870a1c, page size 16384, DirtyShutdown, Windows version 10.0
                                            Category:dropped
                                            Size (bytes):1310720
                                            Entropy (8bit):0.7556005821171399
                                            Encrypted:false
                                            SSDEEP:1536:tSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:tazaSvGJzYj2UlmOlOL
                                            MD5:BE4F98F138268950E4FB8B29CF1087CC
                                            SHA1:2C8791AD7AD9CF654BFCCFF995F7001D92D034A1
                                            SHA-256:B1AB6DD57C93E78AF0C2040DF937D3BB7812C75200074131E010DA1D0622845B
                                            SHA-512:93B328A6F720203636D3A25AAE44B0F39302C6E59B58070BF7DAD696C840E7B33800EF87556CE40F277673539ABB429B3E77A339E7E7B07829BDD3ACE7DA6EF2
                                            Malicious:false
                                            Reputation:low
                                            Preview:....... .......7.......X\...;...{......................0.e......!...{?..3...|..h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{..................................j._.3...|....................Y..3...|...........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):16384
                                            Entropy (8bit):0.08054355096943144
                                            Encrypted:false
                                            SSDEEP:3:KlKYeTusijEENaAPaU1lTzRxlYlluxmO+l/SNxOf:KlKzTzENDPaUGgmOH
                                            MD5:E48E35644F0B4A2DE20C1F076267D1B7
                                            SHA1:F41CE85EA02CB4DD4C42CE0AEEFDF1264F589E01
                                            SHA-256:F180726A58F02B1E0B955B82E059758D206EE34B7EA81A1E766E4A6E562FD0B9
                                            SHA-512:8E3BF3C99D2F4C3B821A666937DC4F77A7C5DC3F0B28BF74EF62ABC5CC13CB02E42635BB5CBEBC563B8A5E59FC1F4DED8877B21EC83471C63F1EE77BFD726E31
                                            Malicious:false
                                            Reputation:low
                                            Preview:.i&......................................;...{...3...|...!...{?..........!...{?..!...{?..g...!...{?...................Y..3...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1248
                                            Entropy (8bit):5.374225325640587
                                            Encrypted:false
                                            SSDEEP:24:3vZ4WSKco4KmZjKbm51s4RPT6moUebIKo+mZ9tXt/NK3R8UHr2:SWSU4xymI4RfoUeW+mZ9tlNWR8Wi
                                            MD5:E3101FAB39034FDB798D8EFA107C0065
                                            SHA1:1F70F289500E531F56DA4C271A4B2B78FCD4D70A
                                            SHA-256:C47ECA48C797627128BF0614E6BA82C8924B0C762A06ADD7EFF09764916FDA07
                                            SHA-512:772587C9FDBEB376892DC144BA5AEAD3EC9E1B00E2CB2F9D2507E0950A5ACC4ED5582A77E6AB63A09DE121C2FF2693A830A1537B8401C18F67B5EB353F43C724
                                            Malicious:false
                                            Reputation:low
                                            Preview:@...e.................................:..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):825344
                                            Entropy (8bit):7.347490812109814
                                            Encrypted:false
                                            SSDEEP:12288:9hpUdvndmMPW31fFnBD3UvELOEG5hLESBRiZSg9nRzlMQeYJV0SdbmmRsGCN:94Fng91fl6vVPYqI9ntqWySsmRw
                                            MD5:0CE8F39E540C12F1FB211F830B29D089
                                            SHA1:AB1AD00D47F2C0EF73713D5B8B3DCD2EC5FD71E4
                                            SHA-256:9EA0A0D830D560E34C04870341FAC3631DED5D423EC8104FE3D56B62FF0668AC
                                            SHA-512:073DDE0AD37C89E26DF133A2E5488B22F2FD1ACFCD038EEEDF1331BC36E774F22077663BC96E92150BE313F84E241FB20C3F2E8B8BC7E8D80AAD2DAE8D453DC9
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 66%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...uw ...............0.................. ........@.. ....................................@.....................................W.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........v...5..........T...................................................( ) ....&.(1.....*".......*".(6....*Vs....(7...t.........*...}.....(8.....~5...tv...(9...&.(.....*..*.(.........*".s....&*.r...p.4...(Z...(%...o[...o\....#..5....(]....0...*....}3....(1.......{3....X.....}2...*z.(1.......}6.....}7.....}8...*z.()...-..(*...,.r...p.(c...*.*"..(+...*2~9....od...*..oe..../..*..of...._3...of...._3...of...._.....*.*..(i...*.~:...*.(/...,.r...p......%...%...(n...*..(o...*.(/
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:JSON data
                                            Category:dropped
                                            Size (bytes):55
                                            Entropy (8bit):4.306461250274409
                                            Encrypted:false
                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                            Malicious:false
                                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.347490812109814
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:DO9uvdGMde.exe
                                            File size:825'344 bytes
                                            MD5:0ce8f39e540c12f1fb211f830b29d089
                                            SHA1:ab1ad00d47f2c0ef73713d5b8b3dcd2ec5fd71e4
                                            SHA256:9ea0a0d830d560e34c04870341fac3631ded5d423ec8104fe3d56b62ff0668ac
                                            SHA512:073dde0ad37c89e26df133a2e5488b22f2fd1acfcd038eeedf1331bc36e774f22077663bc96e92150be313f84e241fb20c3f2e8b8bc7e8d80aad2dae8d453dc9
                                            SSDEEP:12288:9hpUdvndmMPW31fFnBD3UvELOEG5hLESBRiZSg9nRzlMQeYJV0SdbmmRsGCN:94Fng91fl6vVPYqI9ntqWySsmRw
                                            TLSH:D905CE593BE4087AC53E86BBF4E140381AB0B51225E2CA1918CE3DFC6DD7B91895367F
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...uw ...............0.................. ........@.. ....................................@................................
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x4cacfe
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0xBA207775 [Fri Dec 14 05:51:49 2068 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xcaca40x57.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x5a6.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xc8d040xc8e0030d4e54c29ebbdadd387e40a8be47cbbFalse0.5977194500622277data7.35517204613953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xcc0000x5a60x60050a8cc83b8ef9669e19f3643b815f04aFalse0.4140625data4.059206514635826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xce0000xc0x200e7cf008b3b9b20124dc1413088f5b1fcFalse0.041015625data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0xcc0a00x31cdata0.42336683417085424
                                            RT_MANIFEST0xcc3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 4, 2024 14:51:02.950974941 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:02.951014996 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:02.951108932 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:02.957391024 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:02.957406998 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.456953049 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.457170010 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:03.461205959 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:03.461219072 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.461570024 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.502734900 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:03.510337114 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:03.556499958 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.629656076 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.629725933 CEST44349712104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:03.629822016 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:03.639408112 CEST49712443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:04.202230930 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:04.207048893 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:04.207274914 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:05.838196039 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:05.838411093 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:05.843388081 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.144074917 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.146624088 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:06.151691914 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.438324928 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.438926935 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:06.443769932 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.732594967 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.732618093 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.732631922 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.732644081 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.732656956 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:06.732665062 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:06.732716084 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:06.760888100 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:06.766906023 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.055286884 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.058489084 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:07.065732002 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.358938932 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.404167891 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:07.409491062 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.697976112 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.699135065 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:07.703924894 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.993705034 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:07.994004965 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:07.998850107 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.288562059 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.288938999 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:08.293754101 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.617438078 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.617655993 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:08.622759104 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.910018921 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.910840988 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:08.910948992 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:08.911027908 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:08.911051989 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:08.915822029 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.915890932 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.915899992 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:08.915910006 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:09.588355064 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:09.643315077 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:15.929467916 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:15.929537058 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:15.929670095 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:15.933310986 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:15.933326006 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.418093920 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.418170929 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:16.419995070 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:16.420017958 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.420259953 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.471436977 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:16.479564905 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:16.520504951 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.593954086 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.594053030 CEST44349719104.26.13.205192.168.2.6
                                            Sep 4, 2024 14:51:16.594105005 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:16.596540928 CEST49719443192.168.2.6104.26.13.205
                                            Sep 4, 2024 14:51:17.181515932 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:17.186618090 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:17.186693907 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:17.935452938 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:17.937712908 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:17.942487955 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.221385002 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.222395897 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:18.228812933 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.505697966 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.506109953 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:18.510956049 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.791261911 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.791277885 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.791290998 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.791325092 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.791331053 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:18.791338921 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:18.791359901 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:18.793211937 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:18.797990084 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.077799082 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.083772898 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:19.088716984 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.374330997 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.374716997 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:19.380048037 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.660769939 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.661269903 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:19.666189909 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.948513985 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:19.948849916 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:19.953691006 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.235172033 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.235630989 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:20.240679979 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.547689915 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.550353050 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:20.555222988 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.834726095 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.835494041 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:20.835544109 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:20.835560083 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:20.835582972 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:51:20.840336084 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.840378046 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.840456963 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:20.840476990 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:21.490576029 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:51:21.533977985 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:44.221997023 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:44.227869034 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:44.511979103 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:44.512026072 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:44.512128115 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:44.512569904 CEST49713587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:44.517302036 CEST58749713198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:57.206446886 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:57.211396933 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:57.495517015 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:57.495683908 CEST58749720198.54.122.135192.168.2.6
                                            Sep 4, 2024 14:52:57.495793104 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:57.496171951 CEST49720587192.168.2.6198.54.122.135
                                            Sep 4, 2024 14:52:57.504785061 CEST58749720198.54.122.135192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 4, 2024 14:51:02.937597036 CEST5532453192.168.2.61.1.1.1
                                            Sep 4, 2024 14:51:02.945146084 CEST53553241.1.1.1192.168.2.6
                                            Sep 4, 2024 14:51:04.193612099 CEST5071053192.168.2.61.1.1.1
                                            Sep 4, 2024 14:51:04.201461077 CEST53507101.1.1.1192.168.2.6
                                            Sep 4, 2024 14:51:19.760016918 CEST53627791.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Sep 4, 2024 14:51:02.937597036 CEST192.168.2.61.1.1.10x2ddcStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            Sep 4, 2024 14:51:04.193612099 CEST192.168.2.61.1.1.10xb5e5Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Sep 4, 2024 14:51:02.945146084 CEST1.1.1.1192.168.2.60x2ddcNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Sep 4, 2024 14:51:02.945146084 CEST1.1.1.1192.168.2.60x2ddcNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            Sep 4, 2024 14:51:02.945146084 CEST1.1.1.1192.168.2.60x2ddcNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Sep 4, 2024 14:51:04.201461077 CEST1.1.1.1192.168.2.60xb5e5No error (0)mail.privateemail.com198.54.122.135A (IP address)IN (0x0001)false
                                            • api.ipify.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649712104.26.13.2054433236C:\Users\user\Desktop\DO9uvdGMde.exe
                                            TimestampBytes transferredDirectionData
                                            2024-09-04 12:51:03 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-09-04 12:51:03 UTC211INHTTP/1.1 200 OK
                                            Date: Wed, 04 Sep 2024 12:51:03 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8bde1bdb48a743ab-EWR
                                            2024-09-04 12:51:03 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.649719104.26.13.2054431464C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                            TimestampBytes transferredDirectionData
                                            2024-09-04 12:51:16 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-09-04 12:51:16 UTC211INHTTP/1.1 200 OK
                                            Date: Wed, 04 Sep 2024 12:51:16 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8bde1c2c4f588cb9-EWR
                                            2024-09-04 12:51:16 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Sep 4, 2024 14:51:05.838196039 CEST58749713198.54.122.135192.168.2.6220 PrivateEmail.com prod Mail Node
                                            Sep 4, 2024 14:51:05.838411093 CEST49713587192.168.2.6198.54.122.135EHLO 114127
                                            Sep 4, 2024 14:51:06.144074917 CEST58749713198.54.122.135192.168.2.6250-mta-05.privateemail.com
                                            250-PIPELINING
                                            250-SIZE 81788928
                                            250-ETRN
                                            250-AUTH PLAIN LOGIN
                                            250-ENHANCEDSTATUSCODES
                                            250-8BITMIME
                                            250-CHUNKING
                                            250 STARTTLS
                                            Sep 4, 2024 14:51:06.146624088 CEST49713587192.168.2.6198.54.122.135STARTTLS
                                            Sep 4, 2024 14:51:06.438324928 CEST58749713198.54.122.135192.168.2.6220 Ready to start TLS
                                            Sep 4, 2024 14:51:17.935452938 CEST58749720198.54.122.135192.168.2.6220 PrivateEmail.com prod Mail Node
                                            Sep 4, 2024 14:51:17.937712908 CEST49720587192.168.2.6198.54.122.135EHLO 114127
                                            Sep 4, 2024 14:51:18.221385002 CEST58749720198.54.122.135192.168.2.6250-mta-05.privateemail.com
                                            250-PIPELINING
                                            250-SIZE 81788928
                                            250-ETRN
                                            250-AUTH PLAIN LOGIN
                                            250-ENHANCEDSTATUSCODES
                                            250-8BITMIME
                                            250-CHUNKING
                                            250 STARTTLS
                                            Sep 4, 2024 14:51:18.222395897 CEST49720587192.168.2.6198.54.122.135STARTTLS
                                            Sep 4, 2024 14:51:18.505697966 CEST58749720198.54.122.135192.168.2.6220 Ready to start TLS

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:08:50:59
                                            Start date:04/09/2024
                                            Path:C:\Users\user\Desktop\DO9uvdGMde.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\DO9uvdGMde.exe"
                                            Imagebase:0x920000
                                            File size:825'344 bytes
                                            MD5 hash:0CE8F39E540C12F1FB211F830B29D089
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2134026177.0000000003D79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:08:51:00
                                            Start date:04/09/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\DO9uvdGMde.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                                            Imagebase:0x1f0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:08:51:00
                                            Start date:04/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:08:51:01
                                            Start date:04/09/2024
                                            Path:C:\Users\user\Desktop\DO9uvdGMde.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\DO9uvdGMde.exe"
                                            Imagebase:0x50000
                                            File size:825'344 bytes
                                            MD5 hash:0CE8F39E540C12F1FB211F830B29D089
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3370082204.000000000231C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3370082204.0000000002324000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3370082204.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3366188626.0000000000537000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:5
                                            Start time:08:51:01
                                            Start date:04/09/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                            Imagebase:0x7ff7403e0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:6
                                            Start time:08:51:12
                                            Start date:04/09/2024
                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                                            Imagebase:0x140000
                                            File size:825'344 bytes
                                            MD5 hash:0CE8F39E540C12F1FB211F830B29D089
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 66%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:7
                                            Start time:08:51:13
                                            Start date:04/09/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                                            Imagebase:0x1f0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:08:51:13
                                            Start date:04/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:08:51:14
                                            Start date:04/09/2024
                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                                            Imagebase:0xd90000
                                            File size:825'344 bytes
                                            MD5 hash:0CE8F39E540C12F1FB211F830B29D089
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3369881312.0000000003244000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3369881312.0000000003211000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3369881312.0000000003211000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3369881312.000000000323C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:7.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:49
                                              Total number of Limit Nodes:6
                                              execution_graph 17966 2d1fbf0 17967 2d1fc30 VirtualAllocEx 17966->17967 17969 2d1fc6d 17967->17969 17970 2d1fcb0 17971 2d1fcf0 ResumeThread 17970->17971 17973 2d1fd21 17971->17973 18020 2d1fb00 18021 2d1fb48 WriteProcessMemory 18020->18021 18023 2d1fb9f 18021->18023 17974 2d1a598 17978 2d1a690 17974->17978 17986 2d1a680 17974->17986 17975 2d1a5a7 17979 2d1a6a1 17978->17979 17980 2d1a6c4 17978->17980 17979->17980 17994 2d1a928 17979->17994 17998 2d1a91b 17979->17998 17980->17975 17981 2d1a6bc 17981->17980 17982 2d1a8c8 GetModuleHandleW 17981->17982 17983 2d1a8f5 17982->17983 17983->17975 17987 2d1a6a1 17986->17987 17988 2d1a6c4 17986->17988 17987->17988 17992 2d1a928 LoadLibraryExW 17987->17992 17993 2d1a91b LoadLibraryExW 17987->17993 17988->17975 17989 2d1a6bc 17989->17988 17990 2d1a8c8 GetModuleHandleW 17989->17990 17991 2d1a8f5 17990->17991 17991->17975 17992->17989 17993->17989 17995 2d1a93c 17994->17995 17996 2d1a961 17995->17996 18002 2d1a118 17995->18002 17996->17981 18000 2d1a928 17998->18000 17999 2d1a961 17999->17981 18000->17999 18001 2d1a118 LoadLibraryExW 18000->18001 18001->17999 18003 2d1ab08 LoadLibraryExW 18002->18003 18005 2d1ab81 18003->18005 18005->17996 18006 2d1c918 18007 2d1c95e 18006->18007 18008 2d1ca4b 18007->18008 18011 2d1cae9 18007->18011 18014 2d1caf8 18007->18014 18012 2d1cb26 18011->18012 18017 2d1bde0 18011->18017 18012->18008 18015 2d1bde0 DuplicateHandle 18014->18015 18016 2d1cb26 18015->18016 18016->18008 18018 2d1cb60 DuplicateHandle 18017->18018 18019 2d1cbf6 18018->18019 18019->18012 18024 2d1fa28 18025 2d1fa6d Wow64SetThreadContext 18024->18025 18027 2d1fab5 18025->18027

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02D1A8E6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: a2f94c5b0f24641d5050174141929ecb6c50d371201d1b6eb62586f9bdb02838
                                              • Instruction ID: e5ffe049dbebbd2391a9daa40a491b29461ce6a88bf6f3d7d3122d2dcc765653
                                              • Opcode Fuzzy Hash: a2f94c5b0f24641d5050174141929ecb6c50d371201d1b6eb62586f9bdb02838
                                              • Instruction Fuzzy Hash: AA7132B0A01B059FDB24DF2AE05475ABBF1FF88204F10892DD48AC7B50DB74E949CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 58 2d1faf8-2d1fb4e 61 2d1fb50-2d1fb5c 58->61 62 2d1fb5e-2d1fb9d WriteProcessMemory 58->62 61->62 64 2d1fba6-2d1fbd6 62->64 65 2d1fb9f-2d1fba5 62->65 65->64
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02D1FB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: bb4c9926f15e105b5bf6db4d21bd234e8bb663504f88cdcb5fd90e6c3e6c3262
                                              • Instruction ID: 4f9dc008a32b3ef3d7fd2c2314aa380e39b56dbfe37e13ec0cb3575b4d1fbc50
                                              • Opcode Fuzzy Hash: bb4c9926f15e105b5bf6db4d21bd234e8bb663504f88cdcb5fd90e6c3e6c3262
                                              • Instruction Fuzzy Hash: 172115B69003499FDB10CFA9C985BDEBBF5FF88310F108429E958A7740C7789954CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 69 2d1fb00-2d1fb4e 71 2d1fb50-2d1fb5c 69->71 72 2d1fb5e-2d1fb9d WriteProcessMemory 69->72 71->72 74 2d1fba6-2d1fbd6 72->74 75 2d1fb9f-2d1fba5 72->75 75->74
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02D1FB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 8f3e476c10ef3ad6cb835f5c548b89798aa9e1ac26c620b5e6d926edf5a4aaaf
                                              • Instruction ID: dce482877c50b61b2a62a79c93e6cdf94087730b1921a054e1deb88f31675443
                                              • Opcode Fuzzy Hash: 8f3e476c10ef3ad6cb835f5c548b89798aa9e1ac26c620b5e6d926edf5a4aaaf
                                              • Instruction Fuzzy Hash: 902124B59003499FDB10CFAAC981BDEBBF5FF88310F10842AE958A7740C7789954CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 79 2d1fa20-2d1fa73 82 2d1fa83-2d1fa86 79->82 83 2d1fa75-2d1fa81 79->83 84 2d1fa8d-2d1fab3 Wow64SetThreadContext 82->84 83->82 85 2d1fab5-2d1fabb 84->85 86 2d1fabc-2d1faec 84->86 85->86
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02D1FAA6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: b96e48b3c1d1250950ee4ffb2f501871b4f1bd80c925e29353ce8927a928c595
                                              • Instruction ID: 6b83ffaa38c0f7285f1a60409d3e7890e34eeb8e10df15de109a3c9b6abc444b
                                              • Opcode Fuzzy Hash: b96e48b3c1d1250950ee4ffb2f501871b4f1bd80c925e29353ce8927a928c595
                                              • Instruction Fuzzy Hash: 7D2157729003099FDB10CFAAC4817AEBBF4AF88314F148429D518A7740CB789944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 96 2d1cb58-2d1cb5b 97 2d1cb60-2d1cbf4 DuplicateHandle 96->97 98 2d1cbf6-2d1cbfc 97->98 99 2d1cbfd-2d1cc1a 97->99 98->99
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D1CB26,?,?,?,?,?), ref: 02D1CBE7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 7f1b1a2afe621f8cb8c1166cf3c0a7dfd467fa614aef8580aa3a8ed71e87899f
                                              • Instruction ID: ced1154e2a948d839f1a2111b0e338c25df87f352cd48f6a24da8bdaf7d73b4a
                                              • Opcode Fuzzy Hash: 7f1b1a2afe621f8cb8c1166cf3c0a7dfd467fa614aef8580aa3a8ed71e87899f
                                              • Instruction Fuzzy Hash: 9421E3B5900249EFDB10CFAAD985ADEBBF9EB48310F14841AE918E3310D378A954CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 90 2d1bde0-2d1cbf4 DuplicateHandle 92 2d1cbf6-2d1cbfc 90->92 93 2d1cbfd-2d1cc1a 90->93 92->93
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D1CB26,?,?,?,?,?), ref: 02D1CBE7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: bb18dd897900234e6c5a717388cfd8eb1ee35c010f9cf0325a65e2ca7dddd55b
                                              • Instruction ID: 95b2585a951820bf048af634834b1793a143f66a50bd4d35bb38af6c79746514
                                              • Opcode Fuzzy Hash: bb18dd897900234e6c5a717388cfd8eb1ee35c010f9cf0325a65e2ca7dddd55b
                                              • Instruction Fuzzy Hash: ED21E3B5900249EFDB10CFAAD984ADEBBF8FB48310F14801AE954B7310D378A954CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 102 2d1fa28-2d1fa73 104 2d1fa83-2d1fab3 Wow64SetThreadContext 102->104 105 2d1fa75-2d1fa81 102->105 107 2d1fab5-2d1fabb 104->107 108 2d1fabc-2d1faec 104->108 105->104 107->108
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02D1FAA6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 3f5aa173eb4022080de49c5bcc2ef8e647e7b9ddef4b13a72b17d2f52bb71e66
                                              • Instruction ID: 4f650a9445ec955b383b2f6a3c49610f285acf4efde83d2292d4ec4d44ed6e14
                                              • Opcode Fuzzy Hash: 3f5aa173eb4022080de49c5bcc2ef8e647e7b9ddef4b13a72b17d2f52bb71e66
                                              • Instruction Fuzzy Hash: A2213571D043099FDB10DFAAC485BAEBBF4AF88314F14842AD559A7740CB789944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 112 2d1a100-2d1ab48 115 2d1ab50-2d1ab7f LoadLibraryExW 112->115 116 2d1ab4a-2d1ab4d 112->116 117 2d1ab81-2d1ab87 115->117 118 2d1ab88-2d1aba5 115->118 116->115 117->118
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D1A961,00000800,00000000,00000000), ref: 02D1AB72
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 92a09c81a4b80491874ab4a77bf571611fdbf4d8d3da4e9f25186346f07d6360
                                              • Instruction ID: bcd752052be351ff2bf9f796c34dc3923b6b178dccdd63865068fbd92c0a65a0
                                              • Opcode Fuzzy Hash: 92a09c81a4b80491874ab4a77bf571611fdbf4d8d3da4e9f25186346f07d6360
                                              • Instruction Fuzzy Hash: 99217CB6804388DFDB10CFAAD544ADEBBF4EF99320F14805AD558A7311C3789944CFA6

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 121 2d1fbe9-2d1fc33 124 2d1fc3a-2d1fc6b VirtualAllocEx 121->124 125 2d1fc74-2d1fc99 124->125 126 2d1fc6d-2d1fc73 124->126 126->125
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02D1FC5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 23c33e3040f5b75b5938117ed8bec9d494ef878be80f62fb9e1aabac80de620c
                                              • Instruction ID: 2ce97beb832a420f9158e468824cb67e41f972829b58b3b31343f4256e0141e2
                                              • Opcode Fuzzy Hash: 23c33e3040f5b75b5938117ed8bec9d494ef878be80f62fb9e1aabac80de620c
                                              • Instruction Fuzzy Hash: 861144728003499FDB10CFAAC845BDFBBF5EF88720F148419E919A7650C739A940CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 130 2d1a118-2d1ab48 132 2d1ab50-2d1ab7f LoadLibraryExW 130->132 133 2d1ab4a-2d1ab4d 130->133 134 2d1ab81-2d1ab87 132->134 135 2d1ab88-2d1aba5 132->135 133->132 134->135
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D1A961,00000800,00000000,00000000), ref: 02D1AB72
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: eb6281cbc3da08288be091975e833e64844335186dd6d68fb2105860fcca8c69
                                              • Instruction ID: 067b42967e899ad2b97c57429e3053aba1964b313d0a77aec5fc74b3a35f23b3
                                              • Opcode Fuzzy Hash: eb6281cbc3da08288be091975e833e64844335186dd6d68fb2105860fcca8c69
                                              • Instruction Fuzzy Hash: B21114B6900349DFDB10CF9AD544A9EFBF5EB98310F10842AE519A7700C379A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 138 2d1ab00-2d1ab48 140 2d1ab50-2d1ab7f LoadLibraryExW 138->140 141 2d1ab4a-2d1ab4d 138->141 142 2d1ab81-2d1ab87 140->142 143 2d1ab88-2d1aba5 140->143 141->140 142->143
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D1A961,00000800,00000000,00000000), ref: 02D1AB72
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 054159f568dcfd0ca8b6a9061a0b474200f65c34ec278f95fc407c482f763d1b
                                              • Instruction ID: 2efce27376ec527eb257dc387780f47f15d94b40387633dc737de938d3ee2663
                                              • Opcode Fuzzy Hash: 054159f568dcfd0ca8b6a9061a0b474200f65c34ec278f95fc407c482f763d1b
                                              • Instruction Fuzzy Hash: 371142B6801349DFDB10CFAAD544A9EFBF4AB88320F10802AE518A7700C379A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 146 2d1fbf0-2d1fc6b VirtualAllocEx 149 2d1fc74-2d1fc99 146->149 150 2d1fc6d-2d1fc73 146->150 150->149
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02D1FC5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 81023a944cd168f7d9e77459ac02d6f16a3595d8253480813ac3984ac59d352b
                                              • Instruction ID: a12e47278966005ec1a1657931e6c976534cdec7c0a1c1f07aa4b8fff1bbc5ff
                                              • Opcode Fuzzy Hash: 81023a944cd168f7d9e77459ac02d6f16a3595d8253480813ac3984ac59d352b
                                              • Instruction Fuzzy Hash: 13115371800349DFDB10CFAAC845BDFBBF5EF88320F208419E919A7250CB39A940CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 154 2d1fca8-2d1fd1f ResumeThread 158 2d1fd21-2d1fd27 154->158 159 2d1fd28-2d1fd4d 154->159 158->159
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 23ad645eaeedac11e27af5cbe5014a83e1d8b4287ac3a5ab2c41f5a77d45513a
                                              • Instruction ID: d8978dd5bb974264fd5e12579ce73633c4ffaaacd9367193648c13f6c65ca450
                                              • Opcode Fuzzy Hash: 23ad645eaeedac11e27af5cbe5014a83e1d8b4287ac3a5ab2c41f5a77d45513a
                                              • Instruction Fuzzy Hash: CA1146719003489FEB10DFAAC8457AEFBF4EF89610F248419D519A7740CB39A940CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 163 2d1fcb0-2d1fd1f ResumeThread 166 2d1fd21-2d1fd27 163->166 167 2d1fd28-2d1fd4d 163->167 166->167
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 8b12fc2ef56a61e4eda9ad43b74e77cb4f8cbc5a4959d85917ce6b72dc4ab928
                                              • Instruction ID: 186adc7ae398536c98580574d3a9b4a6deb92ec30023c4b0d4c4ca1e705e17c3
                                              • Opcode Fuzzy Hash: 8b12fc2ef56a61e4eda9ad43b74e77cb4f8cbc5a4959d85917ce6b72dc4ab928
                                              • Instruction Fuzzy Hash: D81155B19003488FDB10DFAAC4457AEFBF4AF88220F20841AD519A7740CB39A940CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 171 2d1a880-2d1a8c0 172 2d1a8c2-2d1a8c5 171->172 173 2d1a8c8-2d1a8f3 GetModuleHandleW 171->173 172->173 174 2d1a8f5-2d1a8fb 173->174 175 2d1a8fc-2d1a910 173->175 174->175
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02D1A8E6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 7f14e9cd8f565ec16c8644bc1f04225c2c0b4fa5c89c69419f211a4b3d8892bd
                                              • Instruction ID: 42903f2cb4b793196e2f3f8b85f3360567f81577fe818ada6fe93e9a9bc50bfc
                                              • Opcode Fuzzy Hash: 7f14e9cd8f565ec16c8644bc1f04225c2c0b4fa5c89c69419f211a4b3d8892bd
                                              • Instruction Fuzzy Hash: 2111FDB5C006499BDB10CF9AD444A9EFBF4AB88224F10842AD418A7710C379A945CFA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0707cc849f124dd36cc8bf22ef4b6b1cefdaa46e047574c1bd7fbac80f35d97f
                                              • Instruction ID: cb5e4906145a180087556d46e8bf52cfad47d8bf2652c087dbb216619a6f8494
                                              • Opcode Fuzzy Hash: 0707cc849f124dd36cc8bf22ef4b6b1cefdaa46e047574c1bd7fbac80f35d97f
                                              • Instruction Fuzzy Hash: 4362D2B0E01F458AEF785FB4D44C3AD7A95BB46304F604A1ED0BACA381DF799486CB19
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80a4fde81bcfe36e7fe338a223ee6177342f0c720ea94f7d8e48372dab9ab90f
                                              • Instruction ID: 7fe5349560e01bc0e647c5d854f2231f6099f1f32163709b62b4bb76fb211397
                                              • Opcode Fuzzy Hash: 80a4fde81bcfe36e7fe338a223ee6177342f0c720ea94f7d8e48372dab9ab90f
                                              • Instruction Fuzzy Hash: 2C2250B0E06F424AEB785FA4C48C39DB694BB06314F704A5BC0FACA355DB399087CB49
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8632ce11e438c8a5abf190788d10a9a45df73a5c2f72616f73140c0d779a4279
                                              • Instruction ID: 9265f821e96dc6d5962443172f84cb48a7a925774c1be6e5f65dec59de1d49b3
                                              • Opcode Fuzzy Hash: 8632ce11e438c8a5abf190788d10a9a45df73a5c2f72616f73140c0d779a4279
                                              • Instruction Fuzzy Hash: C3B15D75B006148FDF18EB79C5689AEB7F2AFC9204B244469D802EB7A0DF35DC46CB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 57ded3848d082f746735860f7efb06bb1756c1db7840cbb85e9c227ad474bdc6
                                              • Instruction ID: 6ebe0654c2f9be99fd3fd2631f07724a47f9109b98daf4e8a30f0d0da13cf606
                                              • Opcode Fuzzy Hash: 57ded3848d082f746735860f7efb06bb1756c1db7840cbb85e9c227ad474bdc6
                                              • Instruction Fuzzy Hash: B191D275A0060A9FDF15CFA8D984AAEB7F2BF48310F048929E929D7390E734E955CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e63339642cbb093cb6d779898c64b5de258695a40d8b9cecbbdc68eea9c5e2a
                                              • Instruction ID: de4e402c5ce4172fb92d057901024c1ef17fc1efc234a57fb014c748866af9e7
                                              • Opcode Fuzzy Hash: 2e63339642cbb093cb6d779898c64b5de258695a40d8b9cecbbdc68eea9c5e2a
                                              • Instruction Fuzzy Hash: FF41D534A046198FDB58EBA8C854FDDB7B2BF89314F114069E905AB7A1DB799801CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 48198ec3c4e8fbb8268022bea562b336622cd6386f48b9f5916b151ddf775110
                                              • Instruction ID: f8270ff6d8f1ede39a395c2234d9aad88e085010a270cdd2550ffa1f3097bf12
                                              • Opcode Fuzzy Hash: 48198ec3c4e8fbb8268022bea562b336622cd6386f48b9f5916b151ddf775110
                                              • Instruction Fuzzy Hash: 8221F836B10A109FEF28CE25C88167EB7E7FBC4215F14846AD146D3794C638ED418761
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 56213d1b245b437e08aaf6031c27ff1b9416f1e505bd779b026cd1610ccdd975
                                              • Instruction ID: d7138088e4b241f3579f6b38e38ff56b805c72f09ca1d12c330d29a44114a792
                                              • Opcode Fuzzy Hash: 56213d1b245b437e08aaf6031c27ff1b9416f1e505bd779b026cd1610ccdd975
                                              • Instruction Fuzzy Hash: C821C936B10A105FEF28CE65C88197EB7E7FBC4264F14856AD54793794C638ED408761
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a3db3988ed9cac54c3a3683c25b06a4f8187eee4fd123736505375e9f73f668
                                              • Instruction ID: b195ff250e67aff70034c2c00523639361d648b9fdc039cadeb05fde940f899e
                                              • Opcode Fuzzy Hash: 3a3db3988ed9cac54c3a3683c25b06a4f8187eee4fd123736505375e9f73f668
                                              • Instruction Fuzzy Hash: AD215734711A118FDB289A28C814E2973AAFF89714B25817DE507CB3A0DB76EC42CB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2131851887.0000000002A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A6D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2a6d000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91aa16a1d7639fb54b54051bf89b249e567100f19a099278cbd51c179fe66145
                                              • Instruction ID: f4bbc2d1d277d24d940e5bf68a3efe15b9f964b1e28367e0593571c68abfd0ad
                                              • Opcode Fuzzy Hash: 91aa16a1d7639fb54b54051bf89b249e567100f19a099278cbd51c179fe66145
                                              • Instruction Fuzzy Hash: 152145B2600600EFDB05DF14D9C8B36BF61FB88358F20856CE9090B656C736D856CAA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2132518421.0000000002A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A7D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2a7d000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 04752c4b2d0cc7fa792404ae8b15938a192e14d8bc9dce88c4d19c5ea6c10e0d
                                              • Instruction ID: c71873191cb915d6a405c1abde43f24f8a40dffe941e43f87c21f9e36d19df4b
                                              • Opcode Fuzzy Hash: 04752c4b2d0cc7fa792404ae8b15938a192e14d8bc9dce88c4d19c5ea6c10e0d
                                              • Instruction Fuzzy Hash: D121D0B1604604EFDB04DF24D9C0B26FB65FF94314F24C56DD9094B252CB76D846CAA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2132518421.0000000002A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A7D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2a7d000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a0e461f630691cf0c83e11cf974d68b79695f87eb2810540307d6918298326db
                                              • Instruction ID: cd8b29ab70977762ae18081d2b7951637ccfa6fae0693cfbdc670c69fad9b11b
                                              • Opcode Fuzzy Hash: a0e461f630691cf0c83e11cf974d68b79695f87eb2810540307d6918298326db
                                              • Instruction Fuzzy Hash: 2421F275604604EFDB14DF24DDC0B26BB65FF84314F24C56DD90A4B246CB3AD847CA65
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fa14425a0fdb1538a696c0aa4753e079f5f4cac55267940648c7018568b0ffb2
                                              • Instruction ID: 3fc880e91edd08526b51fa5a7789be14e9f87c7172221a5dbd861d3784cdab00
                                              • Opcode Fuzzy Hash: fa14425a0fdb1538a696c0aa4753e079f5f4cac55267940648c7018568b0ffb2
                                              • Instruction Fuzzy Hash: 6C2107347116118FDB28EA69D454E2973AAFF89714B21847DE507CB3A0DB76DC42CB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c741a3e07d8f9a853c65dbdb3ebba26e80603b1ee234d294ee9a6406f13980e8
                                              • Instruction ID: be405e4eacc8b7eab0de2241f222888ac3f1a290cfd871e919c5e4fd7517b93e
                                              • Opcode Fuzzy Hash: c741a3e07d8f9a853c65dbdb3ebba26e80603b1ee234d294ee9a6406f13980e8
                                              • Instruction Fuzzy Hash: 9A214F39701B008BEF2CAB79956493773E7AFC5204B144C39CA138B7A8EF75D806CA51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2132518421.0000000002A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A7D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2a7d000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ee4102e2a09224e9c8c70a50a328748e1fa53fde45118b373adec4297b6f978
                                              • Instruction ID: ba9d86b0e4e2c4c367c569a4babb520aa8bbde1f0bbb34f244f052f49dd309ee
                                              • Opcode Fuzzy Hash: 9ee4102e2a09224e9c8c70a50a328748e1fa53fde45118b373adec4297b6f978
                                              • Instruction Fuzzy Hash: D8214C755097809FCB12CF24D9D4715BF71EF46214F28C5DAD8498B6A7C33A980BCB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 350f64b7ac37037e1b60f8a7492b0c42ee108b4c6575df15e33899c853363396
                                              • Instruction ID: acf275559da1abcf8211fe711bfb1748ad5972ab9663e02eca082b25178df84e
                                              • Opcode Fuzzy Hash: 350f64b7ac37037e1b60f8a7492b0c42ee108b4c6575df15e33899c853363396
                                              • Instruction Fuzzy Hash: 8F01C071B052185FDB18EBB8A81576FBAE79FC5600F148479A90AC7384EE308D4687E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2131851887.0000000002A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A6D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2a6d000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                              • Instruction ID: bda36fdcfa9c0d20b85177325c7158043c55f8faf29f30946de13ca874c7541c
                                              • Opcode Fuzzy Hash: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                              • Instruction Fuzzy Hash: E511E676504684DFCB16CF10D5C4B26BF72FB84314F24C6A9D8094F656C33AD45ACBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2a79942cd173179880f87b94378f8d7fc01fe4c39f964b9ec5883062c72c6e8
                                              • Instruction ID: 2dbbfc15bc76d8999ecfa7e2db128cfaa9047614fd0f027f13691b8213b8b5e3
                                              • Opcode Fuzzy Hash: d2a79942cd173179880f87b94378f8d7fc01fe4c39f964b9ec5883062c72c6e8
                                              • Instruction Fuzzy Hash: 8511A7B5E0021A9FCB44DFADC9409AEBBF5FF88310B10856AE918E7315E7349911CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2132518421.0000000002A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A7D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2a7d000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction ID: 022f4dfcf1a04e754ff4ea3bccf2aaa1fa8c00fe2e378d0ec2dc95d6278e7e15
                                              • Opcode Fuzzy Hash: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction Fuzzy Hash: BE118B75904684DFCB05CF50D9C4B15FBA2FB84214F28C6A9D8494B656C33AD44ACBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7ed726a8f4896c561337524d131e053ad30d9a0d86db6c963de2d80b847abc7e
                                              • Instruction ID: 2c3c49b8d897f8082140288f42a99a10202e77cd587e67994e55783e13ab222d
                                              • Opcode Fuzzy Hash: 7ed726a8f4896c561337524d131e053ad30d9a0d86db6c963de2d80b847abc7e
                                              • Instruction Fuzzy Hash: DD1189B5E0011A9FCB44DFADD9449AEFBF5FF88310B10816AE919E7315E7309911CBA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b9e595a065cb26ece9ae04da39a2e0145d1b3868a3b3b3243ef371ff4aa3a34a
                                              • Instruction ID: e7b322a4ab454c7a9908d19eea682088c98c526bb9e27e556f445905f79ef55a
                                              • Opcode Fuzzy Hash: b9e595a065cb26ece9ae04da39a2e0145d1b3868a3b3b3243ef371ff4aa3a34a
                                              • Instruction Fuzzy Hash: 92F022227093601BC7166539E859B5AABAB9BC3A60B0981BBE405C7386DC648C06C3A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4136a9328a48e109ebf0305e2a674ffce9b7efdbe1af7cfff12c70153e4c8b14
                                              • Instruction ID: 8ed4521cf35b400cb93193351163e48c492759a417978793cec4260523b47d51
                                              • Opcode Fuzzy Hash: 4136a9328a48e109ebf0305e2a674ffce9b7efdbe1af7cfff12c70153e4c8b14
                                              • Instruction Fuzzy Hash: 3401DF35204641CFDB18DA2AD811E26B3AAFF85610F10C17DD90A8B360DB72EC06CB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 689b95ca2cc034978d73e75dd038ba5bfbd26a6efa06f491f32399dd909715b1
                                              • Instruction ID: 12c1e8cca4fa48b17096ead93638efe06e39425b3e36968b60801be73005f101
                                              • Opcode Fuzzy Hash: 689b95ca2cc034978d73e75dd038ba5bfbd26a6efa06f491f32399dd909715b1
                                              • Instruction Fuzzy Hash: D1018135704601CFDB18DB2AD451E26B3AAFF85620B10C57DD50ACB360DB72EC06CB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 877e627b53b5bfd73203231f27100ce77ef659540e2ed45501239e8a98757702
                                              • Instruction ID: 549e5c91fae37c019f525e08247eb033f654d286f4bc704d62d9af35b9a3b792
                                              • Opcode Fuzzy Hash: 877e627b53b5bfd73203231f27100ce77ef659540e2ed45501239e8a98757702
                                              • Instruction Fuzzy Hash: 07F09676A10618DFC710EF6AD844D8EFBF8EF85310B50462BE50597320EB30A945CBA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 817f2c836a8402e78b75dec80e05e3e431b87b05e21e80c065e00128d55f6f8e
                                              • Instruction ID: d070886d86ac6773e1a395457d793e83ff96832ca1ee1a3a5821bce6299f3668
                                              • Opcode Fuzzy Hash: 817f2c836a8402e78b75dec80e05e3e431b87b05e21e80c065e00128d55f6f8e
                                              • Instruction Fuzzy Hash: 20E020317082505BC706D26DE85094BBFB7DFC57103458A7FE1488B225EE606C068BE0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27a83e83f40301bcc0da410f466016912c20bf15fc423232abe3661d4bd30e79
                                              • Instruction ID: 55f5e3ed249df8789ba7f4745f9718fa5873634ff495e9d6b50009ae1d808f9e
                                              • Opcode Fuzzy Hash: 27a83e83f40301bcc0da410f466016912c20bf15fc423232abe3661d4bd30e79
                                              • Instruction Fuzzy Hash: ACD01237B4873853472935AF641896FB6DFAAD1B61209403FE50AC33889DA58C0292E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fb27272dc21dbdd3a4667f08397e11ed6dac72b15a8d9ffff804834d52f87f7b
                                              • Instruction ID: b9be2e408ae229c45262f3a8df9fe1277515faf9454bb08a8f7beff15c1c4506
                                              • Opcode Fuzzy Hash: fb27272dc21dbdd3a4667f08397e11ed6dac72b15a8d9ffff804834d52f87f7b
                                              • Instruction Fuzzy Hash: 8DD05230208248AFC701EF24C888C857B74EB2A220B488096E8488B263C632E802CBA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef8b81cd6340b0b3f63b8c71432ea022c55141a3b24af5e97fd6fe62d5433b9c
                                              • Instruction ID: 562917f2b1023b958fdf12a7edd7536888a3ff97ee0975434c292b1997bfb78a
                                              • Opcode Fuzzy Hash: ef8b81cd6340b0b3f63b8c71432ea022c55141a3b24af5e97fd6fe62d5433b9c
                                              • Instruction Fuzzy Hash: 19D0126AD05B860BE721A6348845BCEBF60AF73264F4953BA80D0045C1EA041491C601
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2137357694.0000000005F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_5f90000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                              • Instruction ID: 61412fa5721fa0801f19765b42d0f6ac58f054d2697597a3f249e516f761f0d5
                                              • Opcode Fuzzy Hash: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                              • Instruction Fuzzy Hash: 87C00235140108AFC740DF55D445D95BBA9EB59660B1180A1F9484B722C632E9119A90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2133126077.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2d10000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b64f7b8636414d846b70f4a5b8e560cf05b2eab1840c0505a0060e28818807d
                                              • Instruction ID: 5d024f554962986e267a535829614fd4c4ba87e88c5da2c128ec99eca8a7ed4a
                                              • Opcode Fuzzy Hash: 7b64f7b8636414d846b70f4a5b8e560cf05b2eab1840c0505a0060e28818807d
                                              • Instruction Fuzzy Hash: 5CA16732A002199FCF09DFA4E88459EB7B3FF84300B15856AE806AB365DB71AD55CF50
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2118467216.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_4b40000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d3ac70c9940fada28f2985a139a1c2de91d40c4c7e4b9bbd0e97787c85d1279c
                                              • Instruction ID: e9c3bc5e928f1c5e156e6117cfff88f29e9247b4c3b5745d80c6b2e6c4a588fc
                                              • Opcode Fuzzy Hash: d3ac70c9940fada28f2985a139a1c2de91d40c4c7e4b9bbd0e97787c85d1279c
                                              • Instruction Fuzzy Hash: 2D417234A05258DFCB05DFA4D490AECBBB2FF8A300F2584E9E944AB362C735AD55DB50
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2118467216.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_4b40000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73370db0150f736235e06a3f42a99e15bbe1bd43d980c6734edf2c427dc7479e
                                              • Instruction ID: fa021c07599304c7b00654a31bf651ca7ac20347ed38ed966d90c9a81a14ee48
                                              • Opcode Fuzzy Hash: 73370db0150f736235e06a3f42a99e15bbe1bd43d980c6734edf2c427dc7479e
                                              • Instruction Fuzzy Hash: 3891A074A00205CFCB19CF59C4949AEFBB1FF88310B258599E915AB3A5C735FC91DB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2118467216.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_4b40000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 69e2d8aed8948736b750fd2407f3118f46cfe4ee7e7537f8b2ef11cdeabbda73
                                              • Instruction ID: 8fc55f621a4c04dd494147d2a7b82f924362bb84d42afca32e4fde2f8d2fbcb8
                                              • Opcode Fuzzy Hash: 69e2d8aed8948736b750fd2407f3118f46cfe4ee7e7537f8b2ef11cdeabbda73
                                              • Instruction Fuzzy Hash: 62415974A00105CFCB09CF59C198DAAFBB1FF88314B118599E915AB365C736FC91EBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2118240747.000000000328D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0328D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_328d000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 57a42f36fdaee976b34951da2f1bbd5ec7eb3b4e76cd98624207126302d914a9
                                              • Instruction ID: b0db5cb441499d24ea43c1de2465daad946506d82ff27706e19aaa9a61cc9310
                                              • Opcode Fuzzy Hash: 57a42f36fdaee976b34951da2f1bbd5ec7eb3b4e76cd98624207126302d914a9
                                              • Instruction Fuzzy Hash: 7901F731016344EAE710AB25DD80B66FFD8EF81324F0CC459DD080A2C2C6799889C6B2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2118240747.000000000328D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0328D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_328d000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9a41f2252610b0d2d23f38776aff27363148fec31c0856c7cc52c33fbd1a319c
                                              • Instruction ID: 9583e6a46c4e289cd450daed67e1bb23b4d49c661150d105edb4ab0b7074c0db
                                              • Opcode Fuzzy Hash: 9a41f2252610b0d2d23f38776aff27363148fec31c0856c7cc52c33fbd1a319c
                                              • Instruction Fuzzy Hash: AD01ED7244E3C49EE7128B25CC94B56BFB49F53224F1D81DBD9888F2E3C2695849C772

                                              Execution Graph

                                              Execution Coverage:12.8%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:25
                                              Total number of Limit Nodes:4
                                              execution_graph 26900 940848 26902 94084e 26900->26902 26901 94091b 26902->26901 26905 941383 26902->26905 26910 941488 26902->26910 26907 941396 26905->26907 26906 941480 26906->26902 26907->26906 26909 941488 GlobalMemoryStatusEx 26907->26909 26917 947eb0 26907->26917 26909->26907 26911 941414 26910->26911 26912 941396 26910->26912 26911->26912 26914 941488 GlobalMemoryStatusEx 26911->26914 26913 941480 26912->26913 26915 947eb0 GlobalMemoryStatusEx 26912->26915 26916 941488 GlobalMemoryStatusEx 26912->26916 26913->26902 26914->26912 26915->26912 26916->26912 26918 947eba 26917->26918 26919 947ed4 26918->26919 26922 5f8d9c8 26918->26922 26926 5f8d9b8 26918->26926 26919->26907 26923 5f8d9dd 26922->26923 26924 5f8dbee 26923->26924 26925 5f8dc08 GlobalMemoryStatusEx 26923->26925 26924->26919 26925->26923 26927 5f8d9c8 26926->26927 26928 5f8dbee 26927->26928 26929 5f8dc08 GlobalMemoryStatusEx 26927->26929 26928->26919 26929->26927
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8bb7fe2b7845719b7635920456d38189faf6d75e21138b620eebfbf7930236ae
                                              • Instruction ID: 50cecbcb0c47890439102de39cca6617e20359065e096c28f0a3c876d641a27d
                                              • Opcode Fuzzy Hash: 8bb7fe2b7845719b7635920456d38189faf6d75e21138b620eebfbf7930236ae
                                              • Instruction Fuzzy Hash: 5A630C31D10B5A8ADB51EF68C8809A9F7B1FF99300F11C79AE45977121FB70AAD4CB81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6fc8a1d8c948e07cd732031027b5e6c4b4a61f22e377fde111e6040d0435a17d
                                              • Instruction ID: 632b5c2aed0df079230503ce33d755d29c789dde6e14ec4ba75499d96667b609
                                              • Opcode Fuzzy Hash: 6fc8a1d8c948e07cd732031027b5e6c4b4a61f22e377fde111e6040d0435a17d
                                              • Instruction Fuzzy Hash: 9E332131D1071A8EDB11EF68C890AADF7B1FF99300F15C79AE458A7251EB70AAC5CB41

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1429 943e80-943ee6 1431 943f30-943f32 1429->1431 1432 943ee8-943ef3 1429->1432 1434 943f34-943f8c 1431->1434 1432->1431 1433 943ef5-943f01 1432->1433 1435 943f24-943f2e 1433->1435 1436 943f03-943f0d 1433->1436 1443 943fd6-943fd8 1434->1443 1444 943f8e-943f99 1434->1444 1435->1434 1437 943f11-943f20 1436->1437 1438 943f0f 1436->1438 1437->1437 1440 943f22 1437->1440 1438->1437 1440->1435 1446 943fda-943ff2 1443->1446 1444->1443 1445 943f9b-943fa7 1444->1445 1447 943fa9-943fb3 1445->1447 1448 943fca-943fd4 1445->1448 1453 943ff4-943fff 1446->1453 1454 94403c-94403e 1446->1454 1449 943fb5 1447->1449 1450 943fb7-943fc6 1447->1450 1448->1446 1449->1450 1450->1450 1452 943fc8 1450->1452 1452->1448 1453->1454 1456 944001-94400d 1453->1456 1455 944040-94408e 1454->1455 1464 944094-9440a2 1455->1464 1457 944030-94403a 1456->1457 1458 94400f-944019 1456->1458 1457->1455 1460 94401d-94402c 1458->1460 1461 94401b 1458->1461 1460->1460 1462 94402e 1460->1462 1461->1460 1462->1457 1465 9440a4-9440aa 1464->1465 1466 9440ab-94410b 1464->1466 1465->1466 1473 94410d-944111 1466->1473 1474 94411b-94411f 1466->1474 1473->1474 1475 944113 1473->1475 1476 944121-944125 1474->1476 1477 94412f-944133 1474->1477 1475->1474 1476->1477 1478 944127-94412a call 940ab8 1476->1478 1479 944135-944139 1477->1479 1480 944143-944147 1477->1480 1478->1477 1479->1480 1481 94413b-94413e call 940ab8 1479->1481 1482 944157-94415b 1480->1482 1483 944149-94414d 1480->1483 1481->1480 1487 94415d-944161 1482->1487 1488 94416b-94416f 1482->1488 1483->1482 1486 94414f-944152 call 940ab8 1483->1486 1486->1482 1487->1488 1490 944163 1487->1490 1491 944171-944175 1488->1491 1492 94417f 1488->1492 1490->1488 1491->1492 1493 944177 1491->1493 1494 944180 1492->1494 1493->1492 1494->1494
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vvk
                                              • API String ID: 0-1806392228
                                              • Opcode ID: 8154d8e59c0aaf078b3343b47dbc238640931d11a940488519eab8133094a269
                                              • Instruction ID: d5bfa37b20db9c6edbfdde6043276d17ec63e7ae8c308f8c986206fe8412b5e7
                                              • Opcode Fuzzy Hash: 8154d8e59c0aaf078b3343b47dbc238640931d11a940488519eab8133094a269
                                              • Instruction Fuzzy Hash: 96917C70E00209CFDF10CFA9C985B9EBBF2AF98304F148129E815A7254EB749985CF91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bdfecb3ba3ce0fa010e025b135543d50c6ba91e5713e3075969e89c005dba87e
                                              • Instruction ID: 89eda38d7a30821449d556b3c1c440183eed3b8d216bf0f84d9b149166de140d
                                              • Opcode Fuzzy Hash: bdfecb3ba3ce0fa010e025b135543d50c6ba91e5713e3075969e89c005dba87e
                                              • Instruction Fuzzy Hash: 40B15D70E002098FDF10CFA9D885BDDBBF6AF88314F148529D855EB294EB749845CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1396 5f8e931-5f8e94b 1397 5f8e94d-5f8e974 call 5f8d1a0 1396->1397 1398 5f8e975-5f8e994 call 5f8e530 1396->1398 1404 5f8e99a-5f8e9f9 1398->1404 1405 5f8e996-5f8e999 1398->1405 1412 5f8e9fb-5f8e9fe 1404->1412 1413 5f8e9ff-5f8ea81 GlobalMemoryStatusEx 1404->1413 1417 5f8ea85-5f8ea8c 1413->1417 1418 5f8ea8e-5f8ea94 1417->1418 1419 5f8ea95-5f8eabd 1417->1419 1418->1419
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3387073038.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5f80000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf9ab43a1d4db5db0d157fa4a9df2e15ec380d1cea8bf4cb9e0cf10295183ecd
                                              • Instruction ID: fea58ac5a82e514482cd65b429b5cc036cd6d78ddc9e1bc370fd7f31f517887e
                                              • Opcode Fuzzy Hash: bf9ab43a1d4db5db0d157fa4a9df2e15ec380d1cea8bf4cb9e0cf10295183ecd
                                              • Instruction Fuzzy Hash: 79415672D043958FDB00DFA9D8043AEBFF5AF89210F04856AD509E7381DB789845CBE1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1422 5f8ea18-5f8ea56 1423 5f8ea5e-5f8ea81 GlobalMemoryStatusEx 1422->1423 1424 5f8ea85-5f8ea8c 1423->1424 1425 5f8ea8e-5f8ea94 1424->1425 1426 5f8ea95-5f8eabd 1424->1426 1425->1426
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE ref: 05F8EA7F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3387073038.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5f80000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: d544b60cda972da865232f4eee9f25ed3fc0144f333b724593a33957ecd14bcc
                                              • Instruction ID: df3b17aa88b8924eb54c15c2c483882af76a50581c80f7e5cc7a6f1c34454acc
                                              • Opcode Fuzzy Hash: d544b60cda972da865232f4eee9f25ed3fc0144f333b724593a33957ecd14bcc
                                              • Instruction Fuzzy Hash: 3911E2B1C0065A9BDB10DF9AC445B9EFBF8BF48720F15816AD918A7240D378A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1495 943e74-943ee6 1497 943f30-943f32 1495->1497 1498 943ee8-943ef3 1495->1498 1500 943f34-943f8c 1497->1500 1498->1497 1499 943ef5-943f01 1498->1499 1501 943f24-943f2e 1499->1501 1502 943f03-943f0d 1499->1502 1509 943fd6-943fd8 1500->1509 1510 943f8e-943f99 1500->1510 1501->1500 1503 943f11-943f20 1502->1503 1504 943f0f 1502->1504 1503->1503 1506 943f22 1503->1506 1504->1503 1506->1501 1512 943fda-943ff2 1509->1512 1510->1509 1511 943f9b-943fa7 1510->1511 1513 943fa9-943fb3 1511->1513 1514 943fca-943fd4 1511->1514 1519 943ff4-943fff 1512->1519 1520 94403c-94403e 1512->1520 1515 943fb5 1513->1515 1516 943fb7-943fc6 1513->1516 1514->1512 1515->1516 1516->1516 1518 943fc8 1516->1518 1518->1514 1519->1520 1522 944001-94400d 1519->1522 1521 944040-944052 1520->1521 1529 944059-94408e 1521->1529 1523 944030-94403a 1522->1523 1524 94400f-944019 1522->1524 1523->1521 1526 94401d-94402c 1524->1526 1527 94401b 1524->1527 1526->1526 1528 94402e 1526->1528 1527->1526 1528->1523 1530 944094-9440a2 1529->1530 1531 9440a4-9440aa 1530->1531 1532 9440ab-94410b 1530->1532 1531->1532 1539 94410d-944111 1532->1539 1540 94411b-94411f 1532->1540 1539->1540 1541 944113 1539->1541 1542 944121-944125 1540->1542 1543 94412f-944133 1540->1543 1541->1540 1542->1543 1544 944127-94412a call 940ab8 1542->1544 1545 944135-944139 1543->1545 1546 944143-944147 1543->1546 1544->1543 1545->1546 1547 94413b-94413e call 940ab8 1545->1547 1548 944157-94415b 1546->1548 1549 944149-94414d 1546->1549 1547->1546 1553 94415d-944161 1548->1553 1554 94416b-94416f 1548->1554 1549->1548 1552 94414f-944152 call 940ab8 1549->1552 1552->1548 1553->1554 1556 944163 1553->1556 1557 944171-944175 1554->1557 1558 94417f 1554->1558 1556->1554 1557->1558 1559 944177 1557->1559 1560 944180 1558->1560 1559->1558 1560->1560
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vvk
                                              • API String ID: 0-1806392228
                                              • Opcode ID: 512c4750a68d9ec4a106738f5e53365c27a953c5bcac7e1586ba6b91545d3956
                                              • Instruction ID: d927c1d5f1137eb571b5b8afdc590225851d0a786eca11d6338dc0ad6ae0daa0
                                              • Opcode Fuzzy Hash: 512c4750a68d9ec4a106738f5e53365c27a953c5bcac7e1586ba6b91545d3956
                                              • Instruction Fuzzy Hash: 19915A70E00209DFDF10CFA8C985BDEBBF2AF98714F148129E815A7254EB749995CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2006 947d28-947dac 2007 947dae-947db1 2006->2007 2008 947dc5-947dc8 2007->2008 2009 947db3-947dba 2007->2009 2012 947e04-947e07 2008->2012 2013 947dca-947dff 2008->2013 2010 947dc0 2009->2010 2011 947f0b-947f11 2009->2011 2010->2008 2014 947e17-947e1a 2012->2014 2015 947e09 2012->2015 2013->2012 2016 947e1c-947e30 2014->2016 2017 947e4d-947e4f 2014->2017 2034 947e09 call 94868f 2015->2034 2035 947e09 call 9486d8 2015->2035 2036 947e09 call 948728 2015->2036 2023 947e36 2016->2023 2024 947e32-947e34 2016->2024 2019 947e56-947e59 2017->2019 2020 947e51 2017->2020 2018 947e0f-947e12 2018->2014 2019->2007 2022 947e5f-947e6e 2019->2022 2020->2019 2027 947e70-947e73 2022->2027 2028 947e98-947ead 2022->2028 2026 947e39-947e48 2023->2026 2024->2026 2026->2017 2031 947e7b-947e96 2027->2031 2028->2011 2031->2027 2031->2028 2034->2018 2035->2018 2036->2018
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: V
                                              • API String ID: 0-1342839628
                                              • Opcode ID: 9c9bac4a249dbaab78f172cac1cdfe5c2daf96c3b9addf892cd6ae205b891ed8
                                              • Instruction ID: e9bd775ca2c4ccb54b56f0a044101e1d0b5e672ecd7fe48cd29939792973828a
                                              • Opcode Fuzzy Hash: 9c9bac4a249dbaab78f172cac1cdfe5c2daf96c3b9addf892cd6ae205b891ed8
                                              • Instruction Fuzzy Hash: 99316B70E14249CFEB15CFA4C440BAEF7B6EF86300F204969E902EB290EB749C428B50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2037 941488-94148d 2038 941414 2037->2038 2039 94148f-941491 2037->2039 2097 941417 call 941524 2038->2097 2098 941417 call 941498 2038->2098 2099 941417 call 941488 2038->2099 2040 941493-9414af 2039->2040 2041 941418-94141d 2039->2041 2042 9414b1-9414b3 2040->2042 2043 941422-941425 2041->2043 2046 9414b5 2042->2046 2047 9414ba-9414bd 2042->2047 2044 941427 2043->2044 2045 941432-941435 2043->2045 2100 941427 call 947eb0 2044->2100 2101 941427 call 947d98 2044->2101 2102 941427 call 947d28 2044->2102 2048 941437-941456 2045->2048 2049 94145b-94145e 2045->2049 2046->2047 2047->2042 2050 9414bf-9414f4 call 940f24 call 940f34 2047->2050 2048->2049 2052 941460-941467 2049->2052 2053 94146e-941470 2049->2053 2089 9414f6-941506 call 940f34 2050->2089 2090 94151c-941523 2050->2090 2051 94142d 2051->2045 2056 941480-941482 2052->2056 2057 941469 2052->2057 2058 941477-94147a 2053->2058 2059 941472 2053->2059 2057->2053 2058->2056 2060 941396-941399 2058->2060 2059->2058 2062 9413ae-9413b1 2060->2062 2063 94139b-9413a9 2060->2063 2066 9413d7-9413da 2062->2066 2067 9413b3-9413d2 2062->2067 2063->2062 2068 9413e7-9413ea 2066->2068 2069 9413dc 2066->2069 2067->2066 2074 9413ec-9413f3 2068->2074 2075 9413fa-9413fd 2068->2075 2103 9413dc call 9416b0 2069->2103 2104 9413dc call 9417c0 2069->2104 2074->2052 2079 9413f5 2074->2079 2080 941412-941415 2075->2080 2081 9413ff-94140d 2075->2081 2078 9413e2 2078->2068 2079->2075 2080->2043 2083 941417 2080->2083 2081->2080 2105 941417 call 941524 2083->2105 2106 941417 call 941498 2083->2106 2107 941417 call 941488 2083->2107 2087 94141d 2087->2043 2093 94150f-941513 2089->2093 2094 941508-94150a call 940f44 2089->2094 2093->2089 2096 941515 2093->2096 2094->2093 2096->2090 2097->2041 2098->2041 2099->2041 2100->2051 2101->2051 2102->2051 2103->2078 2104->2078 2105->2087 2106->2087 2107->2087
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: V
                                              • API String ID: 0-1342839628
                                              • Opcode ID: c1cbade45c2cd76c6de4dcbf8c118db5487fc5896e67e1654a9aa0ed523cad89
                                              • Instruction ID: 9c897a29b5cc50a80bada0f440709aa7fa0d67ed3b27a028f0c90b1867c1c6c6
                                              • Opcode Fuzzy Hash: c1cbade45c2cd76c6de4dcbf8c118db5487fc5896e67e1654a9aa0ed523cad89
                                              • Instruction Fuzzy Hash: E821DE74A002158FDF21EFBC9444BBD77A9EB88325F24087AE50AE7251E739CD81CB95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2108 946ba1-946c0b 2116 946c27-946c57 2108->2116 2117 946c0d-946c14 call 946364 2108->2117 2123 946c7c-946c82 2116->2123 2124 946c59-946c71 2116->2124 2119 946c19-946c26 2117->2119 2124->2123
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0My
                                              • API String ID: 0-3072640082
                                              • Opcode ID: b974240e5c11b2d57690791d440b28c3e1abcd1d527e22ace9bb3d8a1f49fa2d
                                              • Instruction ID: 3a6b020456955dacf6c559eb0f175b1296edf8ba17a4f24d8329590ffcd76a30
                                              • Opcode Fuzzy Hash: b974240e5c11b2d57690791d440b28c3e1abcd1d527e22ace9bb3d8a1f49fa2d
                                              • Instruction Fuzzy Hash: 1221AF707053819FD715AB78A05476E7BE2EF86301F0188AED585CB295DF358C458B92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2145 9407f9-9407fb 2146 94085c 2145->2146 2147 9407fe-940816 2145->2147 2148 94085e-940861 2146->2148 2160 94079c-9407a3 2147->2160 2161 940818-94081a 2147->2161 2149 9408e5-9408e8 2148->2149 2150 940867-940877 2148->2150 2152 9408f5-9408f8 2149->2152 2153 9408ea 2149->2153 2162 9408a9-9408b1 2150->2162 2163 940879-9408a7 2150->2163 2156 940909-94090b 2152->2156 2157 9408fa 2152->2157 2181 9408ea call 941383 2153->2181 2182 9408ea call 941488 2153->2182 2158 940912-940915 2156->2158 2159 94090d 2156->2159 2169 940904 2157->2169 2167 94084e-940851 2158->2167 2168 94091b-94091d 2158->2168 2159->2158 2161->2146 2165 9408b7-9408b9 2162->2165 2166 9408b3-9408b5 2162->2166 2163->2162 2164 9408f0 2164->2152 2171 9408bf-9408c1 2165->2171 2166->2171 2167->2148 2170 940853 2167->2170 2169->2156 2175 940859 2170->2175 2173 9408c3-9408c9 2171->2173 2174 9408d9-9408e0 2171->2174 2176 9408cd-9408cf 2173->2176 2177 9408cb 2173->2177 2174->2149 2175->2148 2176->2174 2177->2174 2181->2164 2182->2164
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Ko
                                              • API String ID: 0-716275355
                                              • Opcode ID: 36ac1765b39307784b336e88a97026a4c096b589fdb8e4853909e093f1d78b8b
                                              • Instruction ID: df2899589ccddb2e73eb9771145343787a04dec7c429a9eede67f0f4fd8c7be1
                                              • Opcode Fuzzy Hash: 36ac1765b39307784b336e88a97026a4c096b589fdb8e4853909e093f1d78b8b
                                              • Instruction Fuzzy Hash: 54110831A04218CBEF25A779E520BB93395EBD2314F10492ED305CF342E535CC458BC5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2183 940848-94084c 2184 94084e-940851 2183->2184 2185 940853 2184->2185 2186 94085e-940861 2184->2186 2189 940859 2185->2189 2187 9408e5-9408e8 2186->2187 2188 940867-940877 2186->2188 2190 9408f5-9408f8 2187->2190 2191 9408ea 2187->2191 2197 9408a9-9408b1 2188->2197 2198 940879-9408a7 2188->2198 2189->2186 2193 940909-94090b 2190->2193 2194 9408fa 2190->2194 2213 9408ea call 941383 2191->2213 2214 9408ea call 941488 2191->2214 2195 940912-940915 2193->2195 2196 94090d 2193->2196 2203 940904 2194->2203 2195->2184 2202 94091b-94091d 2195->2202 2196->2195 2200 9408b7-9408b9 2197->2200 2201 9408b3-9408b5 2197->2201 2198->2197 2199 9408f0 2199->2190 2204 9408bf-9408c1 2200->2204 2201->2204 2203->2193 2206 9408c3-9408c9 2204->2206 2207 9408d9-9408e0 2204->2207 2208 9408cd-9408cf 2206->2208 2209 9408cb 2206->2209 2207->2187 2208->2207 2209->2207 2213->2199 2214->2199
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Ko
                                              • API String ID: 0-716275355
                                              • Opcode ID: 851290126a7c1695875808b66ec8ac519bcd11f15cb510989cde63f7d1d051c4
                                              • Instruction ID: 9772a741804abbcb4eda38a9653cb36aff141e4836ce6d733a4c5796a41b99c5
                                              • Opcode Fuzzy Hash: 851290126a7c1695875808b66ec8ac519bcd11f15cb510989cde63f7d1d051c4
                                              • Instruction Fuzzy Hash: CF114230B002088BEF65A779DA54F693269EBD6314F204939E706CF355E936DC418BD1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2215 940838-94084c 2216 94084e-940851 2215->2216 2217 940853 2216->2217 2218 94085e-940861 2216->2218 2221 940859 2217->2221 2219 9408e5-9408e8 2218->2219 2220 940867-940877 2218->2220 2222 9408f5-9408f8 2219->2222 2223 9408ea 2219->2223 2229 9408a9-9408b1 2220->2229 2230 940879-9408a7 2220->2230 2221->2218 2225 940909-94090b 2222->2225 2226 9408fa 2222->2226 2245 9408ea call 941383 2223->2245 2246 9408ea call 941488 2223->2246 2227 940912-940915 2225->2227 2228 94090d 2225->2228 2235 940904 2226->2235 2227->2216 2234 94091b-94091d 2227->2234 2228->2227 2232 9408b7-9408b9 2229->2232 2233 9408b3-9408b5 2229->2233 2230->2229 2231 9408f0 2231->2222 2236 9408bf-9408c1 2232->2236 2233->2236 2235->2225 2238 9408c3-9408c9 2236->2238 2239 9408d9-9408e0 2236->2239 2240 9408cd-9408cf 2238->2240 2241 9408cb 2238->2241 2239->2219 2240->2239 2241->2239 2245->2231 2246->2231
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Ko
                                              • API String ID: 0-716275355
                                              • Opcode ID: b6438d66ec7fdb5910b6c1c0071367ef741c944b8e5f524feeef0059c75ec59a
                                              • Instruction ID: f17c8498111af8e80235b47a6e560b633b9748b6af085170155b2be73fbbf404
                                              • Opcode Fuzzy Hash: b6438d66ec7fdb5910b6c1c0071367ef741c944b8e5f524feeef0059c75ec59a
                                              • Instruction Fuzzy Hash: 641194306043048BEF25A775AA14F693765EBD6314F10493ED746CF342E636CC418BC1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 62b776d2e5a833bd5b0564538004ab2e1ec2421906cf35a43d294ddef63fb08b
                                              • Instruction ID: 03fd5cf24670031eb32fcf03cdc0eaf683b5b0fb4612638bdb204c3a699b01ef
                                              • Opcode Fuzzy Hash: 62b776d2e5a833bd5b0564538004ab2e1ec2421906cf35a43d294ddef63fb08b
                                              • Instruction Fuzzy Hash: 1A229D30701242DBDB16AB38E49862D77A6EBCA314B609D3DE205CB355DF79EC46CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3b612b7d597be6d90bef48cf0f7558e37cff6431b5f2f1388f8906c67bebc6c2
                                              • Instruction ID: 9c774c51157d81f02885132c56faf49ba2d4c63ad2b2ae4425d0d52da4aa57f7
                                              • Opcode Fuzzy Hash: 3b612b7d597be6d90bef48cf0f7558e37cff6431b5f2f1388f8906c67bebc6c2
                                              • Instruction Fuzzy Hash: 29126C34701202DBDB16AA38E49866D77A7EBCA314B609D3CE205CB355DF79EC46CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08c017c7dcba074027f762627281bb50172685f05ee620140a457357b1fe24f1
                                              • Instruction ID: 9628c180a27ed3976666528f94dd531f702d70c7db95a3fcea2b420e24d5e3f0
                                              • Opcode Fuzzy Hash: 08c017c7dcba074027f762627281bb50172685f05ee620140a457357b1fe24f1
                                              • Instruction Fuzzy Hash: 5AE19134B00205CFDB14DFA8D594AAEBBB6EF88310F24846AE506DB395DB75DC42CB81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eb02aedcb54b5211c9e436cf9eb04ff5e50d0f926f6c4d1043436d44dd3c610c
                                              • Instruction ID: ef938ecc3802c6eebb0361875dc7ca1401a4d9d1979a1ce790b152e20294cc2b
                                              • Opcode Fuzzy Hash: eb02aedcb54b5211c9e436cf9eb04ff5e50d0f926f6c4d1043436d44dd3c610c
                                              • Instruction Fuzzy Hash: C8A15A70E002498FDF10CFA8D885BDDBBF6AF88354F248529D859EB294EB749845CF81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e48fb0bd2b7493f44689233107978d4f3e5788f52b5aaaffe703a797ee7c6e5f
                                              • Instruction ID: 38b77d1043f6651a591fe459a6f210a3a78bae9f13cfaecac8a65e5307155974
                                              • Opcode Fuzzy Hash: e48fb0bd2b7493f44689233107978d4f3e5788f52b5aaaffe703a797ee7c6e5f
                                              • Instruction Fuzzy Hash: 22518C30704218CFDB14EBA8D458AAD7BF6FF8A704F2044A9E406EB3A1CB359C45CB91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 071286bf388162f9ac0cd385d8750c027dde90c98a416117a53c360ee82b437c
                                              • Instruction ID: fcd667d2d7b13bfc65932066d8f3af69931dce9470613746948c724a1ec940be
                                              • Opcode Fuzzy Hash: 071286bf388162f9ac0cd385d8750c027dde90c98a416117a53c360ee82b437c
                                              • Instruction Fuzzy Hash: 70515B75A00205CFDB14DF69E884B99FBB6FF88310F14C2A9E9089F395E7719945CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 900297a1efba6813e927b2e0ef6a5c004a0cf6b23885f6ff3a297c32297fb1c5
                                              • Instruction ID: 9f1e82a3eb1a358d9687a22d70b1f2cc1630bfa35317e537cd980df4a2e1336f
                                              • Opcode Fuzzy Hash: 900297a1efba6813e927b2e0ef6a5c004a0cf6b23885f6ff3a297c32297fb1c5
                                              • Instruction Fuzzy Hash: F45104B5E002188FDB18CFA9C894BAEBBF5BF49310F148529E815BB391D774A844CF95
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 090a34e248a5f96d37d243ff672e732094a38e7544576bd396366d3735ad6cc9
                                              • Instruction ID: 883596b5a163f538356941a5694a380e7f14e4f220b92182efb02a06d4d8d688
                                              • Opcode Fuzzy Hash: 090a34e248a5f96d37d243ff672e732094a38e7544576bd396366d3735ad6cc9
                                              • Instruction Fuzzy Hash: F45134B4E002188FDB18CFA9C894BAEBBF5BF49300F14852AD815BB391DB749844CF95
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1709949635fad9a0c502f999a44019f6af214a6f00b1caebe5354814eaf2e781
                                              • Instruction ID: c03e74342e70555154eefc1856a711b4f562629d410f551b636d5c2cbba69251
                                              • Opcode Fuzzy Hash: 1709949635fad9a0c502f999a44019f6af214a6f00b1caebe5354814eaf2e781
                                              • Instruction Fuzzy Hash: 1F51CF31215B42CFD705FF3CF899AA63BB6F79B305704D969D20447A2AEAA06945CB40
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5abdd0d95145dc18ebc0d51cfc4d9dae570cebd6a6edaab75b723f7ce70a7ca
                                              • Instruction ID: e9b322d84be7c5741c302ae5e3c5c40f23e369abe7ee9e597c9c7de882449da2
                                              • Opcode Fuzzy Hash: f5abdd0d95145dc18ebc0d51cfc4d9dae570cebd6a6edaab75b723f7ce70a7ca
                                              • Instruction Fuzzy Hash: B941B279A006428FDB51FB78F898B9E7BA6EB89340F108965E605C7355FB34CC85CB81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80dbb8b16e0b45892b2627a348044e8c4cd106b996c1a60c67a0bde3b3dcf462
                                              • Instruction ID: 31d9672fc8e67db450de553eecfc9d8d55d87828ee955c5240fa3a9914adbdca
                                              • Opcode Fuzzy Hash: 80dbb8b16e0b45892b2627a348044e8c4cd106b996c1a60c67a0bde3b3dcf462
                                              • Instruction Fuzzy Hash: B951BE31211B42CFD705FF2DFC99A663BB6F79B305704D969D2044BA29EAB06905CF80
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 770bccf58b246de7c771e4228a29ee8bae10cda1b6fd5011640a338892224e49
                                              • Instruction ID: eda1a38983685f62153d26bb595745d480488ab757b44462210bd4d91b8dc0aa
                                              • Opcode Fuzzy Hash: 770bccf58b246de7c771e4228a29ee8bae10cda1b6fd5011640a338892224e49
                                              • Instruction Fuzzy Hash: F7316131E1025DDBEB14CFA4D444AAEF7B6EF85310F208969E506EB250DB70ED41CB50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8acd9722ad59613731185079330667506d729981b534b94d459bf0ac1feae15b
                                              • Instruction ID: c391b76c46ad26a5b9c5c8f3f2629ce08fa936e4799a35fe8d2ea3da5812918d
                                              • Opcode Fuzzy Hash: 8acd9722ad59613731185079330667506d729981b534b94d459bf0ac1feae15b
                                              • Instruction Fuzzy Hash: DA41EDB0D00349DFEB10DFA9C584ADEBBF5BF48314F648429E819AB250DB75A949CF90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 861bae502a54075cf50eeca6d73b5136522c5a0804cb5940072e3b3ae2079027
                                              • Instruction ID: db545ce568c6d64b979a5995f38be0f29a771a686dc8406b5831cb92a989eba7
                                              • Opcode Fuzzy Hash: 861bae502a54075cf50eeca6d73b5136522c5a0804cb5940072e3b3ae2079027
                                              • Instruction Fuzzy Hash: 6941FEB0D00348DFEB10CFA9C484ADEBBF9FF48710F608029E809AB250DB75A945CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bd81509e9bcb6997bd6ffe57dda88883f03331c47739dabb04c3ef34da8d53ce
                                              • Instruction ID: 20093a4568117d2af913059f2caf6cded81c9afdbf122c143c98e6990059bcd7
                                              • Opcode Fuzzy Hash: bd81509e9bcb6997bd6ffe57dda88883f03331c47739dabb04c3ef34da8d53ce
                                              • Instruction Fuzzy Hash: 4F318134E0464A9BDB15DF69D894A9EF7B6EF8A304F20C619E905FB340DBB09C41CB91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 30d6a0dc81eb4ed110ec7de0a3126e5833596e9d676ffccc5301725ca14655eb
                                              • Instruction ID: 62d81407200436db4b3ed282980e5ae369c5f8b589999ab66fb94be5c3413dd4
                                              • Opcode Fuzzy Hash: 30d6a0dc81eb4ed110ec7de0a3126e5833596e9d676ffccc5301725ca14655eb
                                              • Instruction Fuzzy Hash: DA215E34E0460A9BDB19DFA5D994A9EF7B6EF89300F20C619E905AB340DB719C41CB51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3367096771.00000000006FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6fd000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 66cb7d478b3717c7f0274ffe84aa3d3cf2f5b5a5e16b92c0791bb0a549b7b95a
                                              • Instruction ID: e1aa1fb4ff754e14de48cfe2105f65b19e521e18941d63b1e6e546a7ef266b5d
                                              • Opcode Fuzzy Hash: 66cb7d478b3717c7f0274ffe84aa3d3cf2f5b5a5e16b92c0791bb0a549b7b95a
                                              • Instruction Fuzzy Hash: 8D313C7150D7C49FC7038F20D9A4751BF72AB47214F2985DBD9898F2A3C67A980ACB62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0bf729c4fb370779288a831ad18886db1a9b5aec761908a97fa6b646ff90e7d2
                                              • Instruction ID: f79fbc546cb5cdeb46d2b9a837a8354db7d537d23dc3c27077a37f57bcb201e8
                                              • Opcode Fuzzy Hash: 0bf729c4fb370779288a831ad18886db1a9b5aec761908a97fa6b646ff90e7d2
                                              • Instruction Fuzzy Hash: 95219F71B401049FEB14DBA9C854FAE7BFAEF88720F258169E505EB3A4DA75CD008B91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 61a374805de06da29bed12e24fce7eeb9cd4048ee867cc1b0f58f47361345352
                                              • Instruction ID: 61060dc9f1525546f732e1da68dd60c3398d9fc7d1b624e70d6c878f98c15b0a
                                              • Opcode Fuzzy Hash: 61a374805de06da29bed12e24fce7eeb9cd4048ee867cc1b0f58f47361345352
                                              • Instruction Fuzzy Hash: 702184386016418BEB31A778E498B7D3769E797315F14082EE507C7B91DA69CCC5C782
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3367096771.00000000006FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6fd000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5e951be9c4acaf68a815a1c266645edfca841c24ba7c6fde568bad7a790de248
                                              • Instruction ID: c45292e778ef6b3f226c704ee3c46640210878e82b116f42609ab963ead328ee
                                              • Opcode Fuzzy Hash: 5e951be9c4acaf68a815a1c266645edfca841c24ba7c6fde568bad7a790de248
                                              • Instruction Fuzzy Hash: 4B21C271604208EFDB14DF24D9C4B26BB67FB84314F24C56DEA494B352CB7AE847CA62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8b05d7b05c1a946ab63bbac8d7cf98f3069b4a5e3fa0ec89afead4ee8424a460
                                              • Instruction ID: 666c459d362b071e98417dff7ccd3bc7c35e3a99a1a3495df2bf9ec97aa1f96d
                                              • Opcode Fuzzy Hash: 8b05d7b05c1a946ab63bbac8d7cf98f3069b4a5e3fa0ec89afead4ee8424a460
                                              • Instruction Fuzzy Hash: CD21BB71A402058FEB14CBA8C854BAE7BFAFF88710F248469E501EB3A4DA75CD008B91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 594e1d4e7ede4386b3607a63e41eb5b749c1de1536d42e1402961bb5c5447cf6
                                              • Instruction ID: 8a0b090ab4d02cb6dc1a115d692a35e5d3fca871702e9fd1af0d0d8f18938fd0
                                              • Opcode Fuzzy Hash: 594e1d4e7ede4386b3607a63e41eb5b749c1de1536d42e1402961bb5c5447cf6
                                              • Instruction Fuzzy Hash: A9212834A00609CFDB14DF75D558BAD77F1AF89314F104568E406EB3A1EB3A9D41CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f466a5a1272b778f44c0be88732c3d9a9107af948153b3ba927239ccdbf2bcbb
                                              • Instruction ID: d716ec3be0d18a52e418c190bce832a79f069ba849566f27196275ed6bbb5c3d
                                              • Opcode Fuzzy Hash: f466a5a1272b778f44c0be88732c3d9a9107af948153b3ba927239ccdbf2bcbb
                                              • Instruction Fuzzy Hash: 37215675E007099BCB19CFA4D550A9EB7B2BF89310F248A5AE816F7390DBB09C45CB41
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fae4a3fec0eeae45cea23ec3f45f60e3e1e2d692f8bd062f12d0338042716254
                                              • Instruction ID: 68794830dd9cbfe974d6ecc8f8bf271ceb0cff7e3a0295bbce3b69c1900dd7cd
                                              • Opcode Fuzzy Hash: fae4a3fec0eeae45cea23ec3f45f60e3e1e2d692f8bd062f12d0338042716254
                                              • Instruction Fuzzy Hash: 9B212130700205CFDB28EB78D565BAE77F6AF89345F200868D506EB350EB359D80CBA1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38c8fe1d6c7642d32f1c49e49638870bf70fd58740c78ab3b86761639fa605ba
                                              • Instruction ID: a2c27c84d8d303b8c7c8f5ead4372688718279f4be4200f5b96f34d6876947d0
                                              • Opcode Fuzzy Hash: 38c8fe1d6c7642d32f1c49e49638870bf70fd58740c78ab3b86761639fa605ba
                                              • Instruction Fuzzy Hash: 01215034E007099BCB19CFA4D954A9EB7B6BF89310F20861AE816F7390DBB0AC45CB51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 45731085fc34255edb9fc0adc76f43cd075eb68e0b441b5bd5d93de97215e061
                                              • Instruction ID: 97db5bc13e71e0200bf4d2f7ca8f7e34751eea68de53df687678d9f020f3dc70
                                              • Opcode Fuzzy Hash: 45731085fc34255edb9fc0adc76f43cd075eb68e0b441b5bd5d93de97215e061
                                              • Instruction Fuzzy Hash: F92115386015018BDF15FB7CF898B5A776AE79A314F108A25D206CB255EB34DC85CB91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 18e4316e1a40a4504a3d652a18978dbbf7d0f31a6457150a5c4909c40be16c82
                                              • Instruction ID: e4c22cd2f7e270d1742a2f65db6fcffa98732b93c2471e558e3283d8c617f0e6
                                              • Opcode Fuzzy Hash: 18e4316e1a40a4504a3d652a18978dbbf7d0f31a6457150a5c4909c40be16c82
                                              • Instruction Fuzzy Hash: 6A213934700608CFDB54EB78D958BAD77F5AF89314F104968E40AEB3A1EB369D01CB94
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b620bba60ea310c419b1d672cafafd856d56984e08efc339d54c66058425e1c9
                                              • Instruction ID: e5d78cd87f2c21bd12d7b28bfc70faf5e6586a410b014af383792dd8f72b4e72
                                              • Opcode Fuzzy Hash: b620bba60ea310c419b1d672cafafd856d56984e08efc339d54c66058425e1c9
                                              • Instruction Fuzzy Hash: B7213C30B00245CFDB28EB78D565BAD77F6AB89345F200869D505EB3A1EB3A8D80DB51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7d973a7c5489c21451f462b3d29c369637a7a7e319ebe646c6c23f07793962c8
                                              • Instruction ID: bf3e7163afe66d856db9effb3a605d7b8a981e2b5ec0660dbc7130e405aeed3d
                                              • Opcode Fuzzy Hash: 7d973a7c5489c21451f462b3d29c369637a7a7e319ebe646c6c23f07793962c8
                                              • Instruction Fuzzy Hash: BB014031E012159FCF25EFB98451AAE7BF9EBC8350B240479E505E7301E736D981CB95
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 291ba9d903c2cada9bcac875865f8a5f4bc080744f8507f1bfa7f55004d86c1d
                                              • Instruction ID: 78f11f5782d9e567676bac05eb76e49289d51e2e34ecac61ee2664f9d1dc7b90
                                              • Opcode Fuzzy Hash: 291ba9d903c2cada9bcac875865f8a5f4bc080744f8507f1bfa7f55004d86c1d
                                              • Instruction Fuzzy Hash: EB019231A002048BDB14DFA5E994B89BBB6FF85311F54C668C9085F29AE770AD46CBA1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1a22d0c8d96590c0fa60a0a5e6c9b89d64b0bcfcae74b5a5c73dae7b036ebbf4
                                              • Instruction ID: 18e9908d204769384b812c6ac3c77dddf0e98195c325ae9a47d4941b399fe01d
                                              • Opcode Fuzzy Hash: 1a22d0c8d96590c0fa60a0a5e6c9b89d64b0bcfcae74b5a5c73dae7b036ebbf4
                                              • Instruction Fuzzy Hash: 6901843050528ADFCB02FBB8F9956DD7BB1EF46304F1046ACC5815B296EA312A02CB92
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 711f76afb7969d7f3de925d3b15496aac832cd639355439b66d76f4dcd5206f7
                                              • Instruction ID: 63d25fbbeefd607d279ba7e30f63cb11e5a865a5836bf268f9e4db8a2c6a4f23
                                              • Opcode Fuzzy Hash: 711f76afb7969d7f3de925d3b15496aac832cd639355439b66d76f4dcd5206f7
                                              • Instruction Fuzzy Hash: 13F02B37E04110CFD7228BE89491AECBF74EAD931171844E7E802DB212D235E886C751
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 436eaf6a98953a17e1b62fe6ca14ecbb6fe4691b33a5c46135e58d56ab69a191
                                              • Instruction ID: 663eec8e83c7e31fdb50eae6a10de33cf02a50597762471afbb4297ee7d58afb
                                              • Opcode Fuzzy Hash: 436eaf6a98953a17e1b62fe6ca14ecbb6fe4691b33a5c46135e58d56ab69a191
                                              • Instruction Fuzzy Hash: 3DF0E739B00118CFC714EB78D5A8B6D77B2EF88715F6044A8E5069B3A0CB35AD42CF40
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3369627001.0000000000940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_940000_DO9uvdGMde.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 24588c1b5f7d4cba309b35954154222babc97cadc9dfbe9430b5cb428596cbe0
                                              • Instruction ID: 0a7a5e7e01522fb74ece2e9c70d59e59b823c21cbd0e37544296cbfac5106c56
                                              • Opcode Fuzzy Hash: 24588c1b5f7d4cba309b35954154222babc97cadc9dfbe9430b5cb428596cbe0
                                              • Instruction Fuzzy Hash: 11F03C3090124AEFDB41FBB8F9956DD7BB1EB49300F5086B8C6059B254EA712E058B91

                                              Execution Graph

                                              Execution Coverage:7.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:49
                                              Total number of Limit Nodes:8
                                              execution_graph 16202 95fb00 16203 95fb48 WriteProcessMemory 16202->16203 16205 95fb9f 16203->16205 16206 95fcb0 16207 95fcf0 ResumeThread 16206->16207 16209 95fd21 16207->16209 16210 95fbf0 16211 95fc30 VirtualAllocEx 16210->16211 16213 95fc6d 16211->16213 16214 95cb60 DuplicateHandle 16215 95cbf6 16214->16215 16160 95a598 16164 95a690 16160->16164 16172 95a680 16160->16172 16161 95a5a7 16165 95a6a1 16164->16165 16166 95a6c4 16164->16166 16165->16166 16180 95a928 16165->16180 16184 95a91a 16165->16184 16166->16161 16167 95a6bc 16167->16166 16168 95a8c8 GetModuleHandleW 16167->16168 16169 95a8f5 16168->16169 16169->16161 16173 95a6a1 16172->16173 16174 95a6c4 16172->16174 16173->16174 16178 95a928 LoadLibraryExW 16173->16178 16179 95a91a LoadLibraryExW 16173->16179 16174->16161 16175 95a6bc 16175->16174 16176 95a8c8 GetModuleHandleW 16175->16176 16177 95a8f5 16176->16177 16177->16161 16178->16175 16179->16175 16181 95a93c 16180->16181 16183 95a961 16181->16183 16188 95a118 16181->16188 16183->16167 16185 95a93c 16184->16185 16186 95a118 LoadLibraryExW 16185->16186 16187 95a961 16185->16187 16186->16187 16187->16167 16189 95ab08 LoadLibraryExW 16188->16189 16191 95ab81 16189->16191 16191->16183 16192 95c918 16193 95c95e GetCurrentProcess 16192->16193 16195 95c9b0 GetCurrentThread 16193->16195 16196 95c9a9 16193->16196 16197 95c9e6 16195->16197 16198 95c9ed GetCurrentProcess 16195->16198 16196->16195 16197->16198 16201 95ca23 16198->16201 16199 95ca4b GetCurrentThreadId 16200 95ca7c 16199->16200 16201->16199 16216 95fa28 16217 95fa6d Wow64SetThreadContext 16216->16217 16219 95fab5 16217->16219

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0095C996
                                              • GetCurrentThread.KERNEL32 ref: 0095C9D3
                                              • GetCurrentProcess.KERNEL32 ref: 0095CA10
                                              • GetCurrentThreadId.KERNEL32 ref: 0095CA69
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: ec52fdc035b1c03cede8092ffbd8e375f35e3616e9696b2f7a735c1e07d313a9
                                              • Instruction ID: 20ef647fb0e83e55f660aa0cf4af85789a00d91713b3b8b5a771c2922ab811f6
                                              • Opcode Fuzzy Hash: ec52fdc035b1c03cede8092ffbd8e375f35e3616e9696b2f7a735c1e07d313a9
                                              • Instruction Fuzzy Hash: A25157B0901709CFEB54DFAAD548BEEBBF1EF88304F208459E409A7350D7789945CB66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 23 95c918-95c9a7 GetCurrentProcess 27 95c9b0-95c9e4 GetCurrentThread 23->27 28 95c9a9-95c9af 23->28 29 95c9e6-95c9ec 27->29 30 95c9ed-95ca21 GetCurrentProcess 27->30 28->27 29->30 31 95ca23-95ca29 30->31 32 95ca2a-95ca42 30->32 31->32 44 95ca45 call 95cae9 32->44 45 95ca45 call 95cec8 32->45 36 95ca4b-95ca7a GetCurrentThreadId 37 95ca83-95cae5 36->37 38 95ca7c-95ca82 36->38 38->37 44->36 45->36
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0095C996
                                              • GetCurrentThread.KERNEL32 ref: 0095C9D3
                                              • GetCurrentProcess.KERNEL32 ref: 0095CA10
                                              • GetCurrentThreadId.KERNEL32 ref: 0095CA69
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 6a64b00e220b024ec5eecd3979a0f1cd5ef5f25e39de9dc3886f69a7455a77bd
                                              • Instruction ID: cd3f6085c2771bc14a48774f4e6ffdbd0f6be21cb6c4e85a0b8b85b1d18454d3
                                              • Opcode Fuzzy Hash: 6a64b00e220b024ec5eecd3979a0f1cd5ef5f25e39de9dc3886f69a7455a77bd
                                              • Instruction Fuzzy Hash: CB5167B0901709CFEB54DFAAD548BAEBBF1EF88304F208459E409A7350D778A945CF66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 46 95a690-95a69f 47 95a6a1-95a6ae call 9586ac 46->47 48 95a6cb-95a6cf 46->48 55 95a6c4 47->55 56 95a6b0 47->56 49 95a6d1-95a6db 48->49 50 95a6e3-95a724 48->50 49->50 57 95a726-95a72e 50->57 58 95a731-95a73f 50->58 55->48 101 95a6b6 call 95a928 56->101 102 95a6b6 call 95a91a 56->102 57->58 59 95a741-95a746 58->59 60 95a763-95a765 58->60 63 95a751 59->63 64 95a748-95a74f call 95a0bc 59->64 62 95a768-95a76f 60->62 61 95a6bc-95a6be 61->55 65 95a800-95a8c0 61->65 66 95a771-95a779 62->66 67 95a77c-95a783 62->67 69 95a753-95a761 63->69 64->69 96 95a8c2-95a8c5 65->96 97 95a8c8-95a8f3 GetModuleHandleW 65->97 66->67 70 95a785-95a78d 67->70 71 95a790-95a799 call 95a0cc 67->71 69->62 70->71 77 95a7a6-95a7ab 71->77 78 95a79b-95a7a3 71->78 79 95a7ad-95a7b4 77->79 80 95a7c9-95a7d6 77->80 78->77 79->80 82 95a7b6-95a7c6 call 95a0dc call 95a0ec 79->82 86 95a7f9-95a7ff 80->86 87 95a7d8-95a7f6 80->87 82->80 87->86 96->97 98 95a8f5-95a8fb 97->98 99 95a8fc-95a910 97->99 98->99 101->61 102->61
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0095A8E6
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 6f1de1afcd468d30dadc69af74ca37cf7995205c01df7691a0505bc6f2c2d138
                                              • Instruction ID: c2bb657f556b2dc973b0d1ec1a1f2630792a2f3006335a999fe151beae0719c2
                                              • Opcode Fuzzy Hash: 6f1de1afcd468d30dadc69af74ca37cf7995205c01df7691a0505bc6f2c2d138
                                              • Instruction Fuzzy Hash: 28713570A00B058FD724DF2AD45075ABBF5FF88300F108A2ED94AD7A50DB75E94ACB96

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 103 95faf8-95fb4e 105 95fb50-95fb5c 103->105 106 95fb5e-95fb9d WriteProcessMemory 103->106 105->106 108 95fba6-95fbd6 106->108 109 95fb9f-95fba5 106->109 109->108
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0095FB90
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: e844bd2024e3d844462f827360fd0a28a3903f1b7799af4d33f240a4ec4c399d
                                              • Instruction ID: 92b817584a09be8cfc77eb1233cf4a83675cddf2f5a4198c20b00d19b4e8b6af
                                              • Opcode Fuzzy Hash: e844bd2024e3d844462f827360fd0a28a3903f1b7799af4d33f240a4ec4c399d
                                              • Instruction Fuzzy Hash: 8E212671900349DFDB10CFAAC881BDEBBF5FF48310F108429E918A7250D7789944CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 113 95fb00-95fb4e 115 95fb50-95fb5c 113->115 116 95fb5e-95fb9d WriteProcessMemory 113->116 115->116 118 95fba6-95fbd6 116->118 119 95fb9f-95fba5 116->119 119->118
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0095FB90
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: f939a976d65fb3aef97df6d2c69fee15f2d8f5f46ef7bb20930c9db440bcda28
                                              • Instruction ID: e0957c39b9cb6060f98bea2b5bd4e2856db03e2ea8b8e061c15f7abdc54331bb
                                              • Opcode Fuzzy Hash: f939a976d65fb3aef97df6d2c69fee15f2d8f5f46ef7bb20930c9db440bcda28
                                              • Instruction Fuzzy Hash: 7521E471900349DFDB10CFAAC885BDEBBF5FF48310F108429E959A7240D7799954CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 123 95fa20-95fa73 125 95fa75-95fa81 123->125 126 95fa83-95fa86 123->126 125->126 127 95fa8d-95fab3 Wow64SetThreadContext 126->127 128 95fab5-95fabb 127->128 129 95fabc-95faec 127->129 128->129
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0095FAA6
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 2375a6d369ef2d5e1c4f4d6e015e8ced3786c074f82a3baeefe9e42ecca7e447
                                              • Instruction ID: 8a358b976fb2ed35a7627e6ab4d820f9b8c1452b318c718dd59305eb3181e1e6
                                              • Opcode Fuzzy Hash: 2375a6d369ef2d5e1c4f4d6e015e8ced3786c074f82a3baeefe9e42ecca7e447
                                              • Instruction Fuzzy Hash: 68213871D003099FEB10DFAAC485BEEBBF4EF88324F148429D959A7240D7789945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 133 95cb58-95cbf4 DuplicateHandle 134 95cbf6-95cbfc 133->134 135 95cbfd-95cc1a 133->135 134->135
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0095CBE7
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: d5abb7ec74ebb99b960588ebfafe0c4c9b72c97c2bd97704b93b1568fd7db06d
                                              • Instruction ID: 8596d9abd2ad024d193f0661636ec69656e8a19d03a341e43ea765e3fad2de91
                                              • Opcode Fuzzy Hash: d5abb7ec74ebb99b960588ebfafe0c4c9b72c97c2bd97704b93b1568fd7db06d
                                              • Instruction Fuzzy Hash: F421D2B5D00349DFDB10CFAAD585ADEBBF8EB48310F14841AE918A3350D378A954CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 138 95fa28-95fa73 140 95fa75-95fa81 138->140 141 95fa83-95fab3 Wow64SetThreadContext 138->141 140->141 143 95fab5-95fabb 141->143 144 95fabc-95faec 141->144 143->144
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0095FAA6
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 543e769d6d800823817e147d317f024221738e742bb6173ad6dd924ddccbed2c
                                              • Instruction ID: 74ee24e35403b35a818b1df5e7ee7fbe079b10773f754ca53a2e1cc398ae3448
                                              • Opcode Fuzzy Hash: 543e769d6d800823817e147d317f024221738e742bb6173ad6dd924ddccbed2c
                                              • Instruction Fuzzy Hash: 3F215B71D003098FEB10DFAAC4857EEBBF4EF88320F148429D919A7240D7789945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 148 95cb60-95cbf4 DuplicateHandle 149 95cbf6-95cbfc 148->149 150 95cbfd-95cc1a 148->150 149->150
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0095CBE7
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: c203dd337fa6e96921d61d87fc50f524a0724905806d870c4b2cb2adf4f7f426
                                              • Instruction ID: 4f5ffc3bdc38dc16256ae513eb00331d75815be74b76c654c49551622f5e5154
                                              • Opcode Fuzzy Hash: c203dd337fa6e96921d61d87fc50f524a0724905806d870c4b2cb2adf4f7f426
                                              • Instruction Fuzzy Hash: A521C4B5D00349DFDB10CFAAD985ADEBBF8EB48310F14841AE914A7350D378A954CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 153 95a118-95ab48 155 95ab50-95ab7f LoadLibraryExW 153->155 156 95ab4a-95ab4d 153->156 157 95ab81-95ab87 155->157 158 95ab88-95aba5 155->158 156->155 157->158
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0095A961,00000800,00000000,00000000), ref: 0095AB72
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 8938f790489de9782ceedf7c1dae44d3aa7aea9934e5388e41b4cbbe3a7936de
                                              • Instruction ID: b0b11f7cac776d203de2de587f31ad1d81d43cde7d27b0e651d8a02cb7bfa8ef
                                              • Opcode Fuzzy Hash: 8938f790489de9782ceedf7c1dae44d3aa7aea9934e5388e41b4cbbe3a7936de
                                              • Instruction Fuzzy Hash: DC11E7B5D00349DFDB10CF9AD444A9EFBF9EB48311F14851AD919B7200C379A945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 161 95ab00-95ab48 162 95ab50-95ab7f LoadLibraryExW 161->162 163 95ab4a-95ab4d 161->163 164 95ab81-95ab87 162->164 165 95ab88-95aba5 162->165 163->162 164->165
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0095A961,00000800,00000000,00000000), ref: 0095AB72
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: b9fb5faacf7946c998fd6dca9ee257ac57e5d86b1050ce6261ee6f74725136b4
                                              • Instruction ID: daa2c2f366598b70e2eec800422b3b1ad45790fdcefa44d2a315861be432c004
                                              • Opcode Fuzzy Hash: b9fb5faacf7946c998fd6dca9ee257ac57e5d86b1050ce6261ee6f74725136b4
                                              • Instruction Fuzzy Hash: 261114B6C00349DFDB14CF9AC484ADEFBF9EB88710F10851AD929A7200C379A945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 168 95fbe9-95fc33 170 95fc3a-95fc6b VirtualAllocEx 168->170 171 95fc74-95fc99 170->171 172 95fc6d-95fc73 170->172 172->171
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0095FC5E
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: fd5e730a0a197ee13218ab63500542f8981a3ced5c5ec9f78d660755f3ea8d62
                                              • Instruction ID: f64191214bbe45a320eed179357c53d2c04b609cd13c0c747995a90b527a0753
                                              • Opcode Fuzzy Hash: fd5e730a0a197ee13218ab63500542f8981a3ced5c5ec9f78d660755f3ea8d62
                                              • Instruction Fuzzy Hash: E4114771800349DFDF10DFAAC845ADEBBF5EF88320F108429D919A7250C7759505CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 176 95fbf0-95fc6b VirtualAllocEx 179 95fc74-95fc99 176->179 180 95fc6d-95fc73 176->180 180->179
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0095FC5E
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: eb945900b982e2c3da4ee980a0753b6897ad47377b7e950d23aeef0ab3fd2a5d
                                              • Instruction ID: 3052f284c965a8ab13565e882a443db9a35392f3a46b9cff1d2294a23c9c6aaf
                                              • Opcode Fuzzy Hash: eb945900b982e2c3da4ee980a0753b6897ad47377b7e950d23aeef0ab3fd2a5d
                                              • Instruction Fuzzy Hash: 0C1114718003499FDF10DFAAC845ADEBBF5AF88720F148429E915A7250C779A944CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 184 95fca8-95fd1f ResumeThread 187 95fd21-95fd27 184->187 188 95fd28-95fd4d 184->188 187->188
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: c00a5a583d6996231e76cb11279f091633bdb7957b426c4ba619b6719a5a97ff
                                              • Instruction ID: 34e4502a2b439edc8044161e6eb5c1e73175792724f1efcf9a4f6f55f26b753e
                                              • Opcode Fuzzy Hash: c00a5a583d6996231e76cb11279f091633bdb7957b426c4ba619b6719a5a97ff
                                              • Instruction Fuzzy Hash: 251146B19003498FEB20DFAAC445BAEBBF4EF89320F248429D519A7240C7796905CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 192 95fcb0-95fd1f ResumeThread 195 95fd21-95fd27 192->195 196 95fd28-95fd4d 192->196 195->196
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: aefd9445c3448d31e2ba748cc7ec6d53493e9186536fc20d8d1fdef2b68c76a4
                                              • Instruction ID: e52f6c9cd3ddedf5d22b04761c31eda68a8c0f40e0e2cf974e6d2b735cfe006c
                                              • Opcode Fuzzy Hash: aefd9445c3448d31e2ba748cc7ec6d53493e9186536fc20d8d1fdef2b68c76a4
                                              • Instruction Fuzzy Hash: B1112871D003498FDB10DFAAC44579EFBF8AF89720F248419D519A7240C7796944CBA4
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0095A8E6
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2262620698.0000000000950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_950000_UNK_.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: afa53e329f338e0e367d67e88ea1a3b252aa924b7734309879d4ab51bde72b5b
                                              • Instruction ID: 00dae0249c0d6c476a0bdab27c609ddca9d81c71ecaac42ec0a1e66e35df9e1a
                                              • Opcode Fuzzy Hash: afa53e329f338e0e367d67e88ea1a3b252aa924b7734309879d4ab51bde72b5b
                                              • Instruction Fuzzy Hash: 0511DFB5C00749CFDB10DF9AD444A9EFBF8EB88310F10852AD929B7210C379A54ACFA5
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2260810949.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_8fd000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a349a73b8ce05dc8286b24c4e4062fd3460511e1c31ec13282c3bb2fa6a8bcac
                                              • Instruction ID: f0869f8f4c9544befd36d4899102df3e2ae4595135916a468ae71167f83c8f54
                                              • Opcode Fuzzy Hash: a349a73b8ce05dc8286b24c4e4062fd3460511e1c31ec13282c3bb2fa6a8bcac
                                              • Instruction Fuzzy Hash: 7521FB71504308DFDB05DF24D5C4B26BF66FBA8318F24856DDB098B256C33AD855C6E1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2261146707.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_90d000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e969bde21004836da66382fbfa2354efc62782800b876563eed84c0ef9b8320c
                                              • Instruction ID: c9edafec50a395f981fa40b87cff89ec0dca825ca29d8ab1380ab4c47c874419
                                              • Opcode Fuzzy Hash: e969bde21004836da66382fbfa2354efc62782800b876563eed84c0ef9b8320c
                                              • Instruction Fuzzy Hash: 1121F271604204EFDB14DF64D9C0B26BBB5FB84314F20C96DD90E4B286C33AD847CA62
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2261146707.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_90d000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60d1468dbb0ca9a447345d8ffe29506d5738c43ee6d3fba94ce6e9223d383be4
                                              • Instruction ID: 0c08a29096f4480543d3d1c1b3a645a67d197789e275a89004ca42b298441dac
                                              • Opcode Fuzzy Hash: 60d1468dbb0ca9a447345d8ffe29506d5738c43ee6d3fba94ce6e9223d383be4
                                              • Instruction Fuzzy Hash: 52212675605304EFDB04DF98D5C0B26BBA5FB84324F20C96DD8194B3D2C37AD846CAA1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2260810949.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_8fd000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                              • Instruction ID: a44a1a8aef52df5e2aa8093622d4ee0f000f68c74c7622a758b32fceb0748b13
                                              • Opcode Fuzzy Hash: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                              • Instruction Fuzzy Hash: 4011B176504344DFCB15CF10D5C4B26BF72FBA4314F24C6A9DA098B256C33AD85ACBA2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2261146707.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_90d000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction ID: 31c5b95ebb25bd85c74fa99a67c04f9cff734577a195a10c27fa945b54ebfeda
                                              • Opcode Fuzzy Hash: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction Fuzzy Hash: 8811BB75504280DFCB11CF50D5C4B15FBB2FB84314F24C6AAD8094B696C33AD80ACBA2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2261146707.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_90d000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction ID: 7a72a7ee19293f47ed3cc12be61bdffe84904e11a9d2e19a9c32a9c36c22471d
                                              • Opcode Fuzzy Hash: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction Fuzzy Hash: DE11BB75905280DFCB01CF54D5C0B15FBA2FB84324F24C6A9D8094B296C33AD84ACFA2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bfe509d05fc7afe36f0a556542208cfb380fc7f09c7635cf45351458ec3f4062
                                              • Instruction ID: 88cb7ee17e167c9e3aa8a656d51cb3bbfa58040d2a4cfc989acf7d7c8a94ab5a
                                              • Opcode Fuzzy Hash: bfe509d05fc7afe36f0a556542208cfb380fc7f09c7635cf45351458ec3f4062
                                              • Instruction Fuzzy Hash: C0F10974A00219DFDB15CFA8D494AADFBB2FF89314F248199E805AB365D731ED81CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: L
                                              • API String ID: 0-2909332022
                                              • Opcode ID: d11cc130c690133b4b1a6959dc1fd402a78ddb96f4bcd9c1c7b2d062e9a0e815
                                              • Instruction ID: b634aa656b682ca5e0dd3f5e293558ac606a65e99a0152394153cfc637d43aa2
                                              • Opcode Fuzzy Hash: d11cc130c690133b4b1a6959dc1fd402a78ddb96f4bcd9c1c7b2d062e9a0e815
                                              • Instruction Fuzzy Hash: 59514A35A05248DFCB09CFA9D4909ADBFF2EF4A310F1981E9E850AB362D735A945CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d1af90b475ad087de63669ccb02df08407c4d5ec16aec13ee6fc0acb892fa293
                                              • Instruction ID: 9c7c754f4a2e9bb70f7a19d2495d0ee816426034fd3a5e09d98b1f7651644a41
                                              • Opcode Fuzzy Hash: d1af90b475ad087de63669ccb02df08407c4d5ec16aec13ee6fc0acb892fa293
                                              • Instruction Fuzzy Hash: 01918A74A00649CFCB19CF59C494AAAFBB1FF88310B2486D9E915AB365D735FC41CBA0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27821bf000d92ee55576a60b135c915fd6c17e9170f0da721e60906c3bfecd27
                                              • Instruction ID: 8aa761b1e90d745841fd092ca71131b44dabec38c5820f3607d611965db5e012
                                              • Opcode Fuzzy Hash: 27821bf000d92ee55576a60b135c915fd6c17e9170f0da721e60906c3bfecd27
                                              • Instruction Fuzzy Hash: E7515A34A05248DFCB09CFA9D4909ADBBF2FF89301F1580A9E944AB362D735AD45CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2276062449.0000000007900000.00000040.00000800.00020000.00000000.sdmp, Offset: 07900000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7900000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 74d35d44b722344cd5fc8569df3bf0f932701042c03f166ccf9288c09fc07392
                                              • Instruction ID: 2d2b3d8a049011467cb892736c49c70aa9e9381f856ccf451d954b6f334d30df
                                              • Opcode Fuzzy Hash: 74d35d44b722344cd5fc8569df3bf0f932701042c03f166ccf9288c09fc07392
                                              • Instruction Fuzzy Hash: 3D414AF17502189FDB109BA894107AEBBE6AFD271DB10807ED9558F781D931C90183E2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c2deee939f8a5f67b2b26bbd2b4d920740e21d602326a0a88dc8b4414f2aade
                                              • Instruction ID: 6505fde5554e24f6f6c7314a3d63f0eadd57e588c507b7fe692c133e64532094
                                              • Opcode Fuzzy Hash: 0c2deee939f8a5f67b2b26bbd2b4d920740e21d602326a0a88dc8b4414f2aade
                                              • Instruction Fuzzy Hash: 9C416974A00645DFCB09CF59C1989AAFBB1FF88310B2581D9D915AB364D736FC51CBA0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0322a88074c0e82058a2e8cf46a755a2f0d22f99d0673cc9e692f279a950dd56
                                              • Instruction ID: 47a2111aff8a9403c8fe5da87f48756aa6a6027ffbb4233f13e82225de0d3dc2
                                              • Opcode Fuzzy Hash: 0322a88074c0e82058a2e8cf46a755a2f0d22f99d0673cc9e692f279a950dd56
                                              • Instruction Fuzzy Hash: 41217C74A04249DFCB05DF68C8909AABBB0FF4A300B1580AAD949DB352D735F801CBA1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 09ed10740729e94b28a0a9c0989515ffb402e1ef72e09ca1307905898de1d4ef
                                              • Instruction ID: 29d1f892d8bc19249c15b7a126259a7e2d375797ac15f3a6f01600a4b882cbfc
                                              • Opcode Fuzzy Hash: 09ed10740729e94b28a0a9c0989515ffb402e1ef72e09ca1307905898de1d4ef
                                              • Instruction Fuzzy Hash: 1221F374A05209CFCB00DF98D9909AEBBB1FF89310B1585A9E909AB352D735ED41CBA1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f04d2e2b3d2d4b0b9e023207881d612cf95c439a071c3142546823be100bca08
                                              • Instruction ID: e95602586fb06d6e55d3e99db5b7a67c9e19dcf9002f65dbe339750b016ccb7c
                                              • Opcode Fuzzy Hash: f04d2e2b3d2d4b0b9e023207881d612cf95c439a071c3142546823be100bca08
                                              • Instruction Fuzzy Hash: 43112930504294DFCB02DF6CD8A46E9BFB0FF4A324F1481CAD590AB262C732E811CB55
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2251763526.0000000004A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A3D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a3d000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5347ca2a393e135eff0bd0f334a521bb9212d9dd096f6e2ac13bddbbe7d6754d
                                              • Instruction ID: c507a35a948466e307df8e634b07dc96c2879115dfa412d01da4bdcf8349169e
                                              • Opcode Fuzzy Hash: 5347ca2a393e135eff0bd0f334a521bb9212d9dd096f6e2ac13bddbbe7d6754d
                                              • Instruction Fuzzy Hash: 9F01F771504340EAF7104F25E980B67FFA8EF43B21F08C029FD0A1B242E278A945C6B1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2251763526.0000000004A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A3D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a3d000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dda0588db36309d5af93ef796634aec8b14318ec17eeca66debd2e84a8882f57
                                              • Instruction ID: 1efbb9015941e7969eedff3ee4e8488e0f49c2ca78465225812e67cf0777ebfc
                                              • Opcode Fuzzy Hash: dda0588db36309d5af93ef796634aec8b14318ec17eeca66debd2e84a8882f57
                                              • Instruction Fuzzy Hash: 7A015E6240E3C09EE7128B25D894B52BFB4DF43625F1980DBE9889F1A3C2695849C772
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2252310673.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4bd0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9f3906cd3df795138e15b563b05178454c9690ed3fef96a53b88689ae9862e7b
                                              • Instruction ID: 5f761397bd332a2660931d553a1a5ecdbc0bd491fc8319908d3fd5832f14b7a0
                                              • Opcode Fuzzy Hash: 9f3906cd3df795138e15b563b05178454c9690ed3fef96a53b88689ae9862e7b
                                              • Instruction Fuzzy Hash: 04F06235A00204DFCB04CF99C884AA9F776FF892107248599D94AA7751CB35AC53CB91

                                              Execution Graph

                                              Execution Coverage:8.3%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:81
                                              Total number of Limit Nodes:7
                                              execution_graph 39339 155d044 39340 155d05c 39339->39340 39341 155d0b6 39340->39341 39347 6f1e718 39340->39347 39356 6f1d9b7 39340->39356 39360 6f1cc44 39340->39360 39369 6f1d9c8 39340->39369 39373 6f1da18 39340->39373 39348 6f1e728 39347->39348 39349 6f1e789 39348->39349 39351 6f1e779 39348->39351 39394 6f1cd6c 39349->39394 39378 6f1e8b0 39351->39378 39383 6f1e97c 39351->39383 39389 6f1e8a0 39351->39389 39352 6f1e787 39357 6f1d9c5 39356->39357 39358 6f1da0f 39357->39358 39359 6f1cc44 CallWindowProcW 39357->39359 39358->39341 39359->39358 39361 6f1cc4f 39360->39361 39362 6f1e789 39361->39362 39364 6f1e779 39361->39364 39363 6f1cd6c CallWindowProcW 39362->39363 39365 6f1e787 39363->39365 39366 6f1e8b0 CallWindowProcW 39364->39366 39367 6f1e8a0 CallWindowProcW 39364->39367 39368 6f1e97c CallWindowProcW 39364->39368 39366->39365 39367->39365 39368->39365 39370 6f1d9ee 39369->39370 39371 6f1da0f 39370->39371 39372 6f1cc44 CallWindowProcW 39370->39372 39371->39341 39372->39371 39374 6f1da07 39373->39374 39377 6f1da26 39373->39377 39375 6f1cc44 CallWindowProcW 39374->39375 39376 6f1da0f 39375->39376 39376->39341 39377->39341 39380 6f1e8c4 39378->39380 39379 6f1e950 39379->39352 39398 6f1e968 39380->39398 39401 6f1e958 39380->39401 39384 6f1e93a 39383->39384 39385 6f1e98a 39383->39385 39387 6f1e968 CallWindowProcW 39384->39387 39388 6f1e958 CallWindowProcW 39384->39388 39386 6f1e950 39386->39352 39387->39386 39388->39386 39391 6f1e8ae 39389->39391 39390 6f1e950 39390->39352 39392 6f1e968 CallWindowProcW 39391->39392 39393 6f1e958 CallWindowProcW 39391->39393 39392->39390 39393->39390 39395 6f1cd77 39394->39395 39396 6f1fe6a CallWindowProcW 39395->39396 39397 6f1fe19 39395->39397 39396->39397 39397->39352 39400 6f1e979 39398->39400 39405 6f1fda0 39398->39405 39400->39379 39402 6f1e968 39401->39402 39403 6f1e979 39402->39403 39404 6f1fda0 CallWindowProcW 39402->39404 39403->39379 39404->39403 39406 6f1cd6c CallWindowProcW 39405->39406 39407 6f1fdba 39406->39407 39407->39400 39408 6f1c4d8 39409 6f1c503 39408->39409 39410 6f1c5b2 39409->39410 39412 6f1d7b0 39409->39412 39413 6f1d7c6 39412->39413 39414 6f1d7fe CreateWindowExW 39412->39414 39413->39410 39416 6f1d934 39414->39416 39416->39416 39417 3070848 39418 307084e 39417->39418 39419 307091b 39418->39419 39421 3071382 39418->39421 39422 307138a 39421->39422 39423 3071480 39422->39423 39425 3077eb0 39422->39425 39423->39418 39426 3077eba 39425->39426 39427 3077ed4 39426->39427 39430 6dcd9c8 39426->39430 39434 6dcd9b8 39426->39434 39427->39422 39431 6dcd9dd 39430->39431 39432 6dcdbee 39431->39432 39433 6dcdc08 GlobalMemoryStatusEx 39431->39433 39432->39427 39433->39431 39435 6dcd9c4 39434->39435 39436 6dcdbee 39435->39436 39437 6dcdc08 GlobalMemoryStatusEx 39435->39437 39436->39427 39437->39435
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bdd339881b2cb4a6d9b2869aae20324c679c1d6efe67d8d230f37fdba6cbbbdd
                                              • Instruction ID: bec86e12c89eb65f9442d836d1abdb177df5244d94e18ba91e86549aa72db9bb
                                              • Opcode Fuzzy Hash: bdd339881b2cb4a6d9b2869aae20324c679c1d6efe67d8d230f37fdba6cbbbdd
                                              • Instruction Fuzzy Hash: A3231F31D1071A8EDB11EF68C8806ADF7B5FF99300F15C79AD459A7221EB70AAC5CB41
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 579da88fbecd7df47c29eba39842be939fa728379d8b03fe0fb95c364920eaf9
                                              • Instruction ID: b63019e5c1c7b4228a7efe0c11afa1942547a0ae9dc47b29492a6232a970d840
                                              • Opcode Fuzzy Hash: 579da88fbecd7df47c29eba39842be939fa728379d8b03fe0fb95c364920eaf9
                                              • Instruction Fuzzy Hash: D0330731C10B5A8ADB51EF68C8905A9F7B1FF99300F15D79AE45877221FB70AAC4CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1253 3073e80-3073ee6 1255 3073f30-3073f32 1253->1255 1256 3073ee8-3073ef3 1253->1256 1257 3073f34-3073f8c 1255->1257 1256->1255 1258 3073ef5-3073f01 1256->1258 1267 3073fd6-3073fd8 1257->1267 1268 3073f8e-3073f99 1257->1268 1259 3073f24-3073f2e 1258->1259 1260 3073f03-3073f0d 1258->1260 1259->1257 1262 3073f11-3073f20 1260->1262 1263 3073f0f 1260->1263 1262->1262 1264 3073f22 1262->1264 1263->1262 1264->1259 1270 3073fda-3073ff2 1267->1270 1268->1267 1269 3073f9b-3073fa7 1268->1269 1271 3073fca-3073fd4 1269->1271 1272 3073fa9-3073fb3 1269->1272 1276 3073ff4-3073fff 1270->1276 1277 307403c-307403e 1270->1277 1271->1270 1274 3073fb7-3073fc6 1272->1274 1275 3073fb5 1272->1275 1274->1274 1278 3073fc8 1274->1278 1275->1274 1276->1277 1279 3074001-307400d 1276->1279 1280 3074040-307408e 1277->1280 1278->1271 1281 3074030-307403a 1279->1281 1282 307400f-3074019 1279->1282 1288 3074094-30740a2 1280->1288 1281->1280 1283 307401d-307402c 1282->1283 1284 307401b 1282->1284 1283->1283 1286 307402e 1283->1286 1284->1283 1286->1281 1289 30740a4-30740aa 1288->1289 1290 30740ab-307410b 1288->1290 1289->1290 1297 307410d-3074111 1290->1297 1298 307411b-307411f 1290->1298 1297->1298 1299 3074113 1297->1299 1300 3074121-3074125 1298->1300 1301 307412f-3074133 1298->1301 1299->1298 1300->1301 1302 3074127-307412a call 3070ab8 1300->1302 1303 3074135-3074139 1301->1303 1304 3074143-3074147 1301->1304 1302->1301 1303->1304 1305 307413b-307413e call 3070ab8 1303->1305 1306 3074157-307415b 1304->1306 1307 3074149-307414d 1304->1307 1305->1304 1311 307415d-3074161 1306->1311 1312 307416b-307416f 1306->1312 1307->1306 1310 307414f-3074152 call 3070ab8 1307->1310 1310->1306 1311->1312 1314 3074163 1311->1314 1315 3074171-3074175 1312->1315 1316 307417f 1312->1316 1314->1312 1315->1316 1317 3074177 1315->1317 1318 3074180 1316->1318 1317->1316 1318->1318
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vvk
                                              • API String ID: 0-1806392228
                                              • Opcode ID: 653666d8a4f4be916381acdddd4c84cc018647d1e3510aede67a1b6f026807b5
                                              • Instruction ID: 5e008d0ef221ab18f086c058a5555317c08ff4abb71cca68bd6609e30498a92d
                                              • Opcode Fuzzy Hash: 653666d8a4f4be916381acdddd4c84cc018647d1e3510aede67a1b6f026807b5
                                              • Instruction Fuzzy Hash: E3918C70E01209DFDF50DFAAC9817DEFBF2AF88344F188129E405AB254EB749846CB95
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d95eed5ed254c1bbbc85918b5b13d49c755d067f5778e495cde5b099bd9ccfd8
                                              • Instruction ID: 8e089d243963d1b8d34dad24262267e01cd1412321cfb7aa5d03224152154ea9
                                              • Opcode Fuzzy Hash: d95eed5ed254c1bbbc85918b5b13d49c755d067f5778e495cde5b099bd9ccfd8
                                              • Instruction Fuzzy Hash: C0B17E70E01209CFDB50CFAAC8857ADFBF2BF88314F198529D855EB294EB749845CB85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 967 6f1d7b0-6f1d7c4 968 6f1d7c6-6f1d7f0 call 6f1cc1c 967->968 969 6f1d7fe-6f1d876 967->969 972 6f1d7f5-6f1d7f6 968->972 973 6f1d881-6f1d888 969->973 974 6f1d878-6f1d87e 969->974 975 6f1d893-6f1d932 CreateWindowExW 973->975 976 6f1d88a-6f1d890 973->976 974->973 978 6f1d934-6f1d93a 975->978 979 6f1d93b-6f1d973 975->979 976->975 978->979 983 6f1d980 979->983 984 6f1d975-6f1d978 979->984 985 6f1d981 983->985 984->983 985->985
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06F1D922
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3387224005.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6f10000_UNK_.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 712a0480ff2e7f367b9f35b890efead02b2820fc29d9f8af0680d9ae7ec51c27
                                              • Instruction ID: 22ccce2ecd0fca4eceebf5500e525a56029a75e2355e9494259711e441b4a14b
                                              • Opcode Fuzzy Hash: 712a0480ff2e7f367b9f35b890efead02b2820fc29d9f8af0680d9ae7ec51c27
                                              • Instruction Fuzzy Hash: DA5110B2C00249AFDF05CFA9C994ADDBFB1BF49350F24816AE808AB220D7319845CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1116 6dce931-6dce94b 1117 6dce94d-6dce974 call 6dcd1a0 1116->1117 1118 6dce975-6dce994 call 6dce530 1116->1118 1124 6dce99a-6dce9d2 1118->1124 1125 6dce996-6dce999 1118->1125 1130 6dce9da 1124->1130 1131 6dce9d4-6dce9d8 1124->1131 1132 6dce9dc-6dce9e1 1130->1132 1133 6dce9e2-6dce9f9 1130->1133 1131->1130 1132->1133 1136 6dce9ff-6dcea81 GlobalMemoryStatusEx 1133->1136 1137 6dce9fb-6dce9fe 1133->1137 1140 6dcea85-6dcea8c 1136->1140 1141 6dcea8e-6dcea94 1140->1141 1142 6dcea95-6dceabd 1140->1142 1141->1142
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3386686940.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6dc0000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27c914850a3ba644438e80a493bffd3d30f9400deb26d675e14b880b325b9785
                                              • Instruction ID: 2bc5b54afe40e32f9c8e11f4ec29d7c98650f2f055a63b6ce7c6aa20c11d6f26
                                              • Opcode Fuzzy Hash: 27c914850a3ba644438e80a493bffd3d30f9400deb26d675e14b880b325b9785
                                              • Instruction Fuzzy Hash: A0411472D0439A9FCB10CF69D8106AEBBF5AFCA220F15856ED509A7241DB349845CBE1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1145 6f1d810-6f1d876 1146 6f1d881-6f1d888 1145->1146 1147 6f1d878-6f1d87e 1145->1147 1148 6f1d893-6f1d8cb 1146->1148 1149 6f1d88a-6f1d890 1146->1149 1147->1146 1150 6f1d8d3-6f1d932 CreateWindowExW 1148->1150 1149->1148 1151 6f1d934-6f1d93a 1150->1151 1152 6f1d93b-6f1d973 1150->1152 1151->1152 1156 6f1d980 1152->1156 1157 6f1d975-6f1d978 1152->1157 1158 6f1d981 1156->1158 1157->1156 1158->1158
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06F1D922
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3387224005.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6f10000_UNK_.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 799114e99709348ef0ba596637a61cdddd299bd22de3b78321acd74bc7e080fd
                                              • Instruction ID: 4b8ca777da04b6b7ea15c8cd1877e7d9e850184f250ca8a3342b207c72f076d4
                                              • Opcode Fuzzy Hash: 799114e99709348ef0ba596637a61cdddd299bd22de3b78321acd74bc7e080fd
                                              • Instruction Fuzzy Hash: 8541B0B1D00349DFDB14CFAAC894ADEFBB5BF48350F64812AE818AB250D7759845CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1159 6f1cd6c-6f1fe0c 1162 6f1fe12-6f1fe17 1159->1162 1163 6f1febc-6f1fedc call 6f1cc44 1159->1163 1165 6f1fe19-6f1fe50 1162->1165 1166 6f1fe6a-6f1fea2 CallWindowProcW 1162->1166 1170 6f1fedf-6f1feec 1163->1170 1172 6f1fe52-6f1fe58 1165->1172 1173 6f1fe59-6f1fe68 1165->1173 1168 6f1fea4-6f1feaa 1166->1168 1169 6f1feab-6f1feba 1166->1169 1168->1169 1169->1170 1172->1173 1173->1170
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 06F1FE91
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3387224005.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6f10000_UNK_.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 9a60f722828dfad77b5e3f434c1cb790d432f8b5e0fc83a6b00b1ada1cea4a83
                                              • Instruction ID: fbda2c9da03d50c7c0562635009d5aec99e8a62c3117542dcc26d8d3da75766f
                                              • Opcode Fuzzy Hash: 9a60f722828dfad77b5e3f434c1cb790d432f8b5e0fc83a6b00b1ada1cea4a83
                                              • Instruction Fuzzy Hash: 414127B5D00349DFDB54CF99C448AAABBF5FB88314F248459E519AB321D734A941CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1176 6dcea18-6dcea56 1177 6dcea5e-6dcea81 GlobalMemoryStatusEx 1176->1177 1178 6dcea85-6dcea8c 1177->1178 1179 6dcea8e-6dcea94 1178->1179 1180 6dcea95-6dceabd 1178->1180 1179->1180
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE ref: 06DCEA7F
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3386686940.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6dc0000_UNK_.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: ef04fdd499796f58291725520fb5ed9156c01aa26a80dbfa04767f95c0fd9e57
                                              • Instruction ID: 4e9f845fd5f1a2e431fa0662a192a45adad864e0c4c4b0160d9d27966eb365fc
                                              • Opcode Fuzzy Hash: ef04fdd499796f58291725520fb5ed9156c01aa26a80dbfa04767f95c0fd9e57
                                              • Instruction Fuzzy Hash: CE1112B1C0065A9FDB10CFAAC444B9EFBF4BF48320F15812AD918A7240D378A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1183 3073e74-3073e7c 1184 3073e20-3073e6a 1183->1184 1185 3073e7e-3073ee6 1183->1185 1189 3073f30-3073f32 1185->1189 1190 3073ee8-3073ef3 1185->1190 1191 3073f34-3073f8c 1189->1191 1190->1189 1192 3073ef5-3073f01 1190->1192 1201 3073fd6-3073fd8 1191->1201 1202 3073f8e-3073f99 1191->1202 1193 3073f24-3073f2e 1192->1193 1194 3073f03-3073f0d 1192->1194 1193->1191 1196 3073f11-3073f20 1194->1196 1197 3073f0f 1194->1197 1196->1196 1198 3073f22 1196->1198 1197->1196 1198->1193 1204 3073fda-3073ff2 1201->1204 1202->1201 1203 3073f9b-3073fa7 1202->1203 1205 3073fca-3073fd4 1203->1205 1206 3073fa9-3073fb3 1203->1206 1210 3073ff4-3073fff 1204->1210 1211 307403c-307403e 1204->1211 1205->1204 1208 3073fb7-3073fc6 1206->1208 1209 3073fb5 1206->1209 1208->1208 1212 3073fc8 1208->1212 1209->1208 1210->1211 1213 3074001-307400d 1210->1213 1214 3074040-3074052 1211->1214 1212->1205 1215 3074030-307403a 1213->1215 1216 307400f-3074019 1213->1216 1221 3074059-307408e 1214->1221 1215->1214 1217 307401d-307402c 1216->1217 1218 307401b 1216->1218 1217->1217 1220 307402e 1217->1220 1218->1217 1220->1215 1222 3074094-30740a2 1221->1222 1223 30740a4-30740aa 1222->1223 1224 30740ab-307410b 1222->1224 1223->1224 1231 307410d-3074111 1224->1231 1232 307411b-307411f 1224->1232 1231->1232 1233 3074113 1231->1233 1234 3074121-3074125 1232->1234 1235 307412f-3074133 1232->1235 1233->1232 1234->1235 1236 3074127-307412a call 3070ab8 1234->1236 1237 3074135-3074139 1235->1237 1238 3074143-3074147 1235->1238 1236->1235 1237->1238 1239 307413b-307413e call 3070ab8 1237->1239 1240 3074157-307415b 1238->1240 1241 3074149-307414d 1238->1241 1239->1238 1245 307415d-3074161 1240->1245 1246 307416b-307416f 1240->1246 1241->1240 1244 307414f-3074152 call 3070ab8 1241->1244 1244->1240 1245->1246 1248 3074163 1245->1248 1249 3074171-3074175 1246->1249 1250 307417f 1246->1250 1248->1246 1249->1250 1251 3074177 1249->1251 1252 3074180 1250->1252 1251->1250 1252->1252
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vvk
                                              • API String ID: 0-1806392228
                                              • Opcode ID: e00acface8030175f71af2d1d13d9612feaa6ab54ffb878ce427da6592d9f7a2
                                              • Instruction ID: 23bbcaeb627107b609546a65bcb323c3ab2503154b3d99463ae691f7a2d148ba
                                              • Opcode Fuzzy Hash: e00acface8030175f71af2d1d13d9612feaa6ab54ffb878ce427da6592d9f7a2
                                              • Instruction Fuzzy Hash: 42A18A70E01209DFDB50DFAAD9817DDFBF2BF88354F188129E414AB294EB349846CB95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1319 307a070-307a098 1321 307a09a-307a09d 1319->1321 1322 307a0d6-307a0d9 1321->1322 1323 307a09f-307a0d1 1321->1323 1324 307a0fc-307a0fe 1322->1324 1325 307a0db-307a0f7 1322->1325 1323->1322 1326 307a105-307a108 1324->1326 1327 307a100 1324->1327 1325->1324 1326->1321 1328 307a10a-307a119 1326->1328 1327->1326 1332 307a11b-307a122 1328->1332 1333 307a15a-307a16f 1328->1333 1334 307a124-307a12a 1332->1334 1335 307a149-307a158 1332->1335 1339 307a170 1333->1339 1340 307a130 call 307a2b0 1334->1340 1341 307a130 call 307a4ae 1334->1341 1342 307a130 call 307a22c 1334->1342 1335->1332 1335->1333 1337 307a136-307a141 1337->1335 1339->1339 1340->1337 1341->1337 1342->1337
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: L
                                              • API String ID: 0-2909332022
                                              • Opcode ID: 70df57afa5ce66c1ecb246b0fb75deba7a7c5b9d3fd3cd931af0586a723c0e59
                                              • Instruction ID: 049d757cb5d4e8a677fa23aa40f518b7b22c70e5875d740a2f5e29d9904ec742
                                              • Opcode Fuzzy Hash: 70df57afa5ce66c1ecb246b0fb75deba7a7c5b9d3fd3cd931af0586a723c0e59
                                              • Instruction Fuzzy Hash: FF31B435F0124A9BEB15CF68D850A9EFBF6FF89300F14C669E805AB341DB719941CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1364 3070848-307084c 1365 307084e-3070851 1364->1365 1366 3070853 1365->1366 1367 307085e-3070861 1365->1367 1370 3070859 1366->1370 1368 3070867-3070877 1367->1368 1369 30708e5-30708e8 1367->1369 1378 30708a9-30708b1 1368->1378 1379 3070879-30708a7 1368->1379 1371 30708f5-30708f8 1369->1371 1372 30708ea call 3071382 1369->1372 1370->1367 1373 30708fa 1371->1373 1374 3070909-307090b 1371->1374 1380 30708f0 1372->1380 1381 3070904 1373->1381 1376 3070912-3070915 1374->1376 1377 307090d 1374->1377 1376->1365 1384 307091b-307091d 1376->1384 1377->1376 1382 30708b7-30708b9 1378->1382 1383 30708b3-30708b5 1378->1383 1379->1378 1380->1371 1381->1374 1385 30708bf-30708c1 1382->1385 1383->1385 1387 30708c3-30708c9 1385->1387 1388 30708d9-30708e0 1385->1388 1390 30708cd-30708cf 1387->1390 1391 30708cb 1387->1391 1388->1369 1390->1388 1391->1388
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Ko
                                              • API String ID: 0-716275355
                                              • Opcode ID: 01a7d9b7c4572fb79bc7802aeeee34110890818d9f410ba9c826b24fec43935c
                                              • Instruction ID: 418c4de9e05b2160c1b17f6b74d2fe518bbb5ec4207a27ec51e6c9f9ee704633
                                              • Opcode Fuzzy Hash: 01a7d9b7c4572fb79bc7802aeeee34110890818d9f410ba9c826b24fec43935c
                                              • Instruction Fuzzy Hash: 4E119430F0220D8BEFE4EB7AD8147693699EB46214F248B7AD556CF241DA21CC858BD9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1395 3070838-307084c 1396 307084e-3070851 1395->1396 1397 3070853 1396->1397 1398 307085e-3070861 1396->1398 1401 3070859 1397->1401 1399 3070867-3070877 1398->1399 1400 30708e5-30708e8 1398->1400 1409 30708a9-30708b1 1399->1409 1410 3070879-30708a7 1399->1410 1402 30708f5-30708f8 1400->1402 1403 30708ea call 3071382 1400->1403 1401->1398 1404 30708fa 1402->1404 1405 3070909-307090b 1402->1405 1411 30708f0 1403->1411 1412 3070904 1404->1412 1407 3070912-3070915 1405->1407 1408 307090d 1405->1408 1407->1396 1415 307091b-307091d 1407->1415 1408->1407 1413 30708b7-30708b9 1409->1413 1414 30708b3-30708b5 1409->1414 1410->1409 1411->1402 1412->1405 1416 30708bf-30708c1 1413->1416 1414->1416 1418 30708c3-30708c9 1416->1418 1419 30708d9-30708e0 1416->1419 1421 30708cd-30708cf 1418->1421 1422 30708cb 1418->1422 1419->1400 1421->1419 1422->1419
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Ko
                                              • API String ID: 0-716275355
                                              • Opcode ID: 73e590e1b8dea225475106f756234df845d1678067fb5d6240f6d54b5a25c5e3
                                              • Instruction ID: 4794f9a264bd9fb314ebc561fac37be6780556a9d977c6dd511766efd4fd700d
                                              • Opcode Fuzzy Hash: 73e590e1b8dea225475106f756234df845d1678067fb5d6240f6d54b5a25c5e3
                                              • Instruction Fuzzy Hash: 0A11C670F0220D9BEFE4EB75D81077A3298E786314F148B7ED556CB281EA25CC858BD9
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6eabf21c3f98ffb0c8e5714c8df2ba894c674d032567ec99d1cb1895e08ff3f0
                                              • Instruction ID: 995af94bc8db150aad160da37f48bcf551a08e85af7f2e79e217ff9b0f5900ab
                                              • Opcode Fuzzy Hash: 6eabf21c3f98ffb0c8e5714c8df2ba894c674d032567ec99d1cb1895e08ff3f0
                                              • Instruction Fuzzy Hash: DE12E330B01206DBEB699B38E85535D77A2FB8A711F24A97DE002CB354DE75DC86CB81
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e65580fe6b3cbcca944cecf473fa56b63be49acdcc36d43e630a55d2991eb3c
                                              • Instruction ID: c11c1fca3f09da871953a92966cacedae2041ed92bc6392eef8bec5a457fe7d3
                                              • Opcode Fuzzy Hash: 2e65580fe6b3cbcca944cecf473fa56b63be49acdcc36d43e630a55d2991eb3c
                                              • Instruction Fuzzy Hash: 7DE19E35F02205CFDB64CB68D584AAEBBF2EB88310F248469E906DB350DB35DD42CB94
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 45cacc5b0dd671fe11affbc3378407400dca5838826fff947514c368ef6c73e9
                                              • Instruction ID: a4d1288976b475543605c977533c31424d091cccac6c53d0205719c28dded7cf
                                              • Opcode Fuzzy Hash: 45cacc5b0dd671fe11affbc3378407400dca5838826fff947514c368ef6c73e9
                                              • Instruction Fuzzy Hash: FFB17C70E01209DFDB50CFAAC8857DDFBF2AF88314F198129D858EB254EB749845CB85
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: acf633444c3ae42487d04407b3fea159ea171d3ac9661513bd4a7e14d4d47ccd
                                              • Instruction ID: ae4a0594368d6664713b8b07059e2bfcf00d280b8a68ba15ab10e1c9171b9d0d
                                              • Opcode Fuzzy Hash: acf633444c3ae42487d04407b3fea159ea171d3ac9661513bd4a7e14d4d47ccd
                                              • Instruction Fuzzy Hash: 89716871B01205DFDB54CFA9E884B9DBBF6FF88310F1481A9E9089B395EB719941CB90
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 82cc2cab53a1241f028d26387a56a90ec537ce97a370329db12b0d102ba977fd
                                              • Instruction ID: dc36f95c3000de09e5b11caba18d3a07cbf06970169c7b1cc2ec210a0086b0df
                                              • Opcode Fuzzy Hash: 82cc2cab53a1241f028d26387a56a90ec537ce97a370329db12b0d102ba977fd
                                              • Instruction Fuzzy Hash: A4618C34B11609CFDB14DB68C458AAD7BF2AF89700F2444A9D406EB3A1CB76DC41CBA5
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bcda39d300449c91bd96fef944a3508c13f22ae2977030675428327069325bed
                                              • Instruction ID: 31ba51152259ab25e55538c8eda231535b99620690b78b05598593043d1a182b
                                              • Opcode Fuzzy Hash: bcda39d300449c91bd96fef944a3508c13f22ae2977030675428327069325bed
                                              • Instruction Fuzzy Hash: 8A317071E1124ACFDB55CF65C8407AEB7B6EF49B40F64886AE402EB290EB709C41CB54
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d262ce6297b170bcad09615ff00d1a82986a3c2b1438f2e1657d833e0a8634c
                                              • Instruction ID: 4b1fa30e3d7b1db3e4ced690daf023f9c443de7bc6c7d93b23de0b37ff297e18
                                              • Opcode Fuzzy Hash: 5d262ce6297b170bcad09615ff00d1a82986a3c2b1438f2e1657d833e0a8634c
                                              • Instruction Fuzzy Hash: 43513270D116198FDB14CFA9C844BEDBBF1BF48300F188429E816BB390D775A844CB95
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2210f19307a53cfd891b097a8c3b62877a9a5e7caa3e6ca9e92fb7bdd6c9fad3
                                              • Instruction ID: 25d9acb9d9802663904aa93fe3380431ae95b8c6c87b35c78afa01aca301aff3
                                              • Opcode Fuzzy Hash: 2210f19307a53cfd891b097a8c3b62877a9a5e7caa3e6ca9e92fb7bdd6c9fad3
                                              • Instruction Fuzzy Hash: 77512371D116188FDB14CFA9C894BADFBF1BF48310F188529E816BB390DB75A844CB99
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3b6075a962cefc0c72f2143df5f364b7208ba88f1392563c6b7be24eef4cde6f
                                              • Instruction ID: 753ad44f5889b3c87dbca147719a61421a49eccbbc82f4816bd7d8357ac0f40e
                                              • Opcode Fuzzy Hash: 3b6075a962cefc0c72f2143df5f364b7208ba88f1392563c6b7be24eef4cde6f
                                              • Instruction Fuzzy Hash: E4510C31611346CFD705DF2AFEA1A943FB1F79A304704A1A9D1244B226EA786DC9DFC1
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 221135db60a720d1fc3ef71b90e00302ae3f286e41cd83d9ebe1ab9a14975356
                                              • Instruction ID: 5bd67085c91122bce799c2d7b1d400e6195a0636ba6ca519af3cd52d9a8deecf
                                              • Opcode Fuzzy Hash: 221135db60a720d1fc3ef71b90e00302ae3f286e41cd83d9ebe1ab9a14975356
                                              • Instruction Fuzzy Hash: F351EB30611346CFC719DF2AFEA1A943FB1F79A305304A1A9D1254B225EA782DCADFC1
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef26445efa0d550827b3abd5cc323349a28c9e5baa8f289c3ba3a7e8986ba4c9
                                              • Instruction ID: b9dc2444a3773ec5415cb5f415a605b9daf781d83cec72e442521f523d949a93
                                              • Opcode Fuzzy Hash: ef26445efa0d550827b3abd5cc323349a28c9e5baa8f289c3ba3a7e8986ba4c9
                                              • Instruction Fuzzy Hash: 1F317031E11219CFDB55CFA5C8407AEB7B6FF89B50F248966E402EB240DB70AC41CB94
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3b53a2f8f62e126120488e444b0abc7e81025eb121760093b9d9cbe07d796c70
                                              • Instruction ID: fb435eedad8106f2541a96c0aa1ba6cd12dd5494a89384fbc4ae2f8cb63d4915
                                              • Opcode Fuzzy Hash: 3b53a2f8f62e126120488e444b0abc7e81025eb121760093b9d9cbe07d796c70
                                              • Instruction Fuzzy Hash: C941EFB1D01349DFEB10CFA9C584ADEBBF9BF48310F248429E819AB250EB359945CF94
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7ea33c5df09bf834ffabc99a1916a1a31cc2c4780081b204db2370ca4c1a0195
                                              • Instruction ID: c7757e042e50f897b60395a8f30f3b5a6e2ec23d136863beacd41bd60ab4b466
                                              • Opcode Fuzzy Hash: 7ea33c5df09bf834ffabc99a1916a1a31cc2c4780081b204db2370ca4c1a0195
                                              • Instruction Fuzzy Hash: 28410EB0D01348DFEB10CFA9C584ADEBBF9FF48310F248429E809AB250DB35A945CB94
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7606d533fa0e59e6a9fed59d6ff2a90ef0d9d7b259a97c7cc34ee6efa4198c45
                                              • Instruction ID: 694f521b8c2c7c79cefdab29efd7ef5adb5506fc92476a554803e58a79c4b744
                                              • Opcode Fuzzy Hash: 7606d533fa0e59e6a9fed59d6ff2a90ef0d9d7b259a97c7cc34ee6efa4198c45
                                              • Instruction Fuzzy Hash: AF217E31F0120A9BDB19CFA9D95069EF7B6FF89300F14C659E805AB340DB719881CB90
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0a3fbbb277a455a44baf05d63afd2e68a7559a5490290fe7107fc1bb51959912
                                              • Instruction ID: 23a059cff78026b80199c08e4a66fafc250f6d1f6e1f849f7bddc458d347a363
                                              • Opcode Fuzzy Hash: 0a3fbbb277a455a44baf05d63afd2e68a7559a5490290fe7107fc1bb51959912
                                              • Instruction Fuzzy Hash: 4421B334A011498BEF64EB39FC8579A3BB9E789304F148A74E415CB281EB38DC81CF95
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 279efcb620b344e283b420785ae4e6e6186a8471e268bc700bca2382422c8f33
                                              • Instruction ID: dac78605925bc01b1ca13725f99a89f94ebdfee6e13494f1df6d4cccc59139ea
                                              • Opcode Fuzzy Hash: 279efcb620b344e283b420785ae4e6e6186a8471e268bc700bca2382422c8f33
                                              • Instruction Fuzzy Hash: B6210232B012459FD715AB79D8507AE3BB7FF8A600F1484AED009CB394EE798C42CB91
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d644539dab1e75d7b8e781ec641e33a5928fdc87f4c3c8947e51b4072dfcace2
                                              • Instruction ID: 61117bab1ec5a5a15928d057821bdaf9a4234501bca1ad8532fb4014fce7dad9
                                              • Opcode Fuzzy Hash: d644539dab1e75d7b8e781ec641e33a5928fdc87f4c3c8947e51b4072dfcace2
                                              • Instruction Fuzzy Hash: 1921C571E01205DBCB15CFA4C9506EEB7B2BF89310F248A1AF812FB390DB709846CB54
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fb5d341e564e3ae2eb610608e293eb27b23972636bfee9d9964c761e179e3e73
                                              • Instruction ID: adb728c62679b20cb738ad77de58aa4628ab4cbf6d80eefcbc79d8411fc3c318
                                              • Opcode Fuzzy Hash: fb5d341e564e3ae2eb610608e293eb27b23972636bfee9d9964c761e179e3e73
                                              • Instruction Fuzzy Hash: ED21DA70E121049BEFBC9768D89936D3BA9E742315F18046DF506C77C0DB28C885CB8A
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b040017f91c232aebf8280e66bdc9984105498694ecbfde48e52258629852080
                                              • Instruction ID: ba66ddb843f4a65a635f6c998e91810c6d6d87bb64dcd3884bdc09fcf035d1c0
                                              • Opcode Fuzzy Hash: b040017f91c232aebf8280e66bdc9984105498694ecbfde48e52258629852080
                                              • Instruction Fuzzy Hash: AE217C30F01249CFDB68DB78C9156AE77F6AF49245F2408A9D406EB2D0EB398D41CB95
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91a6720dde08b18e629bb8e0cc9f3a6f8c28370a2ea1d3800b76c007abac36aa
                                              • Instruction ID: 14b6b300fc4a45c6f5f14416f9bbd4c5af8eb41d917d9dae8ebb85f7eba0491a
                                              • Opcode Fuzzy Hash: 91a6720dde08b18e629bb8e0cc9f3a6f8c28370a2ea1d3800b76c007abac36aa
                                              • Instruction Fuzzy Hash: FD212A34B00208CFCB54DF79D958AAD77F1EF8E214B1044A8E406EB3A0DB759D01CB95
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369105208.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_155d000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 82936f204e3dd72604ca06e00102d7451e081946626f2378ce14a9b232bbc667
                                              • Instruction ID: 682cecb9515fd573f269b38d124f2e9a7eca6b972fda079042d574e195ca661d
                                              • Opcode Fuzzy Hash: 82936f204e3dd72604ca06e00102d7451e081946626f2378ce14a9b232bbc667
                                              • Instruction Fuzzy Hash: 35212572504204EFDB51DF64D9D0B26BBB1FB84314F20C96EED090F262D736D446CA61
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 59735868f3f1029f12a881fed95b6524f8b409e2cbf26df98c6b09b70a81553c
                                              • Instruction ID: 4cece47b5a5e9d83bc1271821c03b9129914ae3aa839098c53baae7bd6deb113
                                              • Opcode Fuzzy Hash: 59735868f3f1029f12a881fed95b6524f8b409e2cbf26df98c6b09b70a81553c
                                              • Instruction Fuzzy Hash: 77216D30F01209CFDB58DB79C9156AE77F6AF89241F1404A9D406EB390EB398D41CBA5
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b88fd53e49da6ef5694af55d07bbcb80561748f42dd22c4c1bdc924dda92a5ca
                                              • Instruction ID: 0b12bad94707b29ff3b69cbd3f11de0dd4a68810e14507d20b8fc00b2d1b96e0
                                              • Opcode Fuzzy Hash: b88fd53e49da6ef5694af55d07bbcb80561748f42dd22c4c1bdc924dda92a5ca
                                              • Instruction Fuzzy Hash: A8218330E01205DBCB14CFA4C8505DEB7B6BF89310F108A1AF812FB380DB70A846CB54
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 01aa1351eaa34b7e81caff066c46f244bb266e25d22115c47067c2e30b7221b3
                                              • Instruction ID: 674c8c9018bd4cd5c4b3d2442d0f988d079f2e8675eab583066a2bc8fbedb95a
                                              • Opcode Fuzzy Hash: 01aa1351eaa34b7e81caff066c46f244bb266e25d22115c47067c2e30b7221b3
                                              • Instruction Fuzzy Hash: 73218134A011498BDB64EB39FC8479A3BBAE749304F148665E416CB291EB38DC81CFD5
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e44a7eeeb2732c1f1aeadf7a28b5c2b107201b6ccee96063ed4518b37c919a67
                                              • Instruction ID: d2c63f39f5ca4fcd825c3f47425643090093711ecd5d1312fe5f182207ce7ae8
                                              • Opcode Fuzzy Hash: e44a7eeeb2732c1f1aeadf7a28b5c2b107201b6ccee96063ed4518b37c919a67
                                              • Instruction Fuzzy Hash: 4B213C34B00208CFCB64DB79C958AAD77F1EF8E214B1004A8E406EB3A4DB769D05CBD5
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c7665a15cc0f497731e6c6bd44cfbff0c30d6470ad9c6eefafa16920db1623bf
                                              • Instruction ID: 4bbbb2c8dd96173ce1311c9ca50d8727b12c0629eb287d05dd7716532a7fc38c
                                              • Opcode Fuzzy Hash: c7665a15cc0f497731e6c6bd44cfbff0c30d6470ad9c6eefafa16920db1623bf
                                              • Instruction Fuzzy Hash: 64113276F022155BCB909FB99C4426F7FF9EB88690F140471E906D3380EE38C802CB81
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 383d9aa78dd542f6a01892501a54a05fd7b04b27c348b0e197b058950b89369e
                                              • Instruction ID: 47f2d40c9a007e431dda0407274429aca922cdaf30f399b022959ecb0b1591ad
                                              • Opcode Fuzzy Hash: 383d9aa78dd542f6a01892501a54a05fd7b04b27c348b0e197b058950b89369e
                                              • Instruction Fuzzy Hash: F511A175E023159FCF69EFB888502ADBAF9EB88250F180479D805EB341E635D942CB99
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 767a16b6d80eba0ad8143ef28c85a126cfd1cf7a80b35815f3b51eb4b4d08dd7
                                              • Instruction ID: 3740e61ede239eb673359961ec7524f079ab0d3d02ef955b8cc3d56f0accc0fb
                                              • Opcode Fuzzy Hash: 767a16b6d80eba0ad8143ef28c85a126cfd1cf7a80b35815f3b51eb4b4d08dd7
                                              • Instruction Fuzzy Hash: 7B018075E023159FCF69EFB884502AEBBF9EB88250B180579D405EB340E735D942CB99
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369105208.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_155d000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction ID: 4143979b289e065911e125c59bf6375103c1b9f15e9b0cd3426d22a3cad246f5
                                              • Opcode Fuzzy Hash: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                              • Instruction Fuzzy Hash: 28119776504284DFCB12CF54C9D4B19BBB2FB84214F24C6AAD8494F262C33AD44ACB62
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38d6027453cdd16b6e9014466f0060edbc02b277900c91899b8434cc3b95cec4
                                              • Instruction ID: f4674b6cfcae6446fd470501f9064f8b591b648fdb3447e8510441d69c93d163
                                              • Opcode Fuzzy Hash: 38d6027453cdd16b6e9014466f0060edbc02b277900c91899b8434cc3b95cec4
                                              • Instruction Fuzzy Hash: A2018431A012058BDB14DFA5E994B8ABBB6FF95310F548178C9085B299EB709D05C7A1
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: da42482b94cfdabf9104fad8a57523d8a46231430714be7c349697da32d0c3e9
                                              • Instruction ID: b25df74a1fc11e018954e98d46607f5fb46389ffbbdc194059ec7601e4205cf5
                                              • Opcode Fuzzy Hash: da42482b94cfdabf9104fad8a57523d8a46231430714be7c349697da32d0c3e9
                                              • Instruction Fuzzy Hash: 1F01697090110EEFEB40EBB9FC50BDD7BB1EB54700F1082B9C50697354EA746E468B91
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 078a0d0ae53a62966a9ff8c76df1f872875d452385216647589182550068a885
                                              • Instruction ID: b24a92855820d821411363392ca546c177bfab2c57d3ae4fa08bf59ccacaf8fb
                                              • Opcode Fuzzy Hash: 078a0d0ae53a62966a9ff8c76df1f872875d452385216647589182550068a885
                                              • Instruction Fuzzy Hash: A1F0F637E06250DFC71ADBA898901ACBBB1EA9825171C4097D802DB781D232D442CB59
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0f5bec94ced302f0a4387e69c04ac41b2d89dd8860e3601ae7d0c65347cee7b3
                                              • Instruction ID: 6c176f248697d5dce89cc6a05d4e6a51267ea9e0646593f7c2e7c09cd185e3a7
                                              • Opcode Fuzzy Hash: 0f5bec94ced302f0a4387e69c04ac41b2d89dd8860e3601ae7d0c65347cee7b3
                                              • Instruction Fuzzy Hash: C7F0C439B011188FC754DB64D9A8B6C7BB2EF88615F6040A8E5069B3A0CF35AD42CF40
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3369532843.0000000003070000.00000040.00000800.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_3070000_UNK_.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4d1b980d2a0208076299a603623f082885512edf744c89f5575f44c63dc97779
                                              • Instruction ID: 90bd10990933708762a56c6ba97ed9d3fe7e385dcb486f047c61aa6a060a11ff
                                              • Opcode Fuzzy Hash: 4d1b980d2a0208076299a603623f082885512edf744c89f5575f44c63dc97779
                                              • Instruction Fuzzy Hash: C2F03770A0110EEFEB44EBB9FD60ADD7BB1EB84700F1082B9C5069B254EE752E458B91
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06F12E86
                                              • GetCurrentThread.KERNEL32 ref: 06F12EC3
                                              • GetCurrentProcess.KERNEL32 ref: 06F12F00
                                              • GetCurrentThreadId.KERNEL32 ref: 06F12F59
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3387224005.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6f10000_UNK_.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 439f57c6fafbdbabf822b66f8588a585e929d8c637b48942769e5b4f0e3a6b22
                                              • Instruction ID: 21d524df3048b03e14a4d26208f0a36e68cf36fcf72d06817d39aff93e6f7947
                                              • Opcode Fuzzy Hash: 439f57c6fafbdbabf822b66f8588a585e929d8c637b48942769e5b4f0e3a6b22
                                              • Instruction Fuzzy Hash: C55146B0901709DFDB54DFAAD948BAEBBF1EF88310F208459E019AB390D7356984CF65
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06F12E86
                                              • GetCurrentThread.KERNEL32 ref: 06F12EC3
                                              • GetCurrentProcess.KERNEL32 ref: 06F12F00
                                              • GetCurrentThreadId.KERNEL32 ref: 06F12F59
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.3387224005.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6f10000_UNK_.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: f9441bfa16584152d50b247614724b03be2813c64213fbffdebc0011bc5202a3
                                              • Instruction ID: 83db2f50dfd5fdb3e9effc7a9e37d8c39e4d4d59e1c373767029f671bb815980
                                              • Opcode Fuzzy Hash: f9441bfa16584152d50b247614724b03be2813c64213fbffdebc0011bc5202a3
                                              • Instruction Fuzzy Hash: 6E5146B0901709DFDB54DFAAD948BAEBBF1EF88310F208459E019AB390D7356984CF65