Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZcgffemBWp.exe

Overview

General Information

Sample name:ZcgffemBWp.exe
renamed because original name is a hash value
Original sample name:b1e42e804e79dae0932a733f40a2a467a8fcc646db45fe506b0cb444613c4846.exe
Analysis ID:1504223
MD5:287604b42529f6196a1f8e6c4cb4c573
SHA1:0eb2e702961172cb63691ba9a3ce3f663259dc7f
SHA256:b1e42e804e79dae0932a733f40a2a467a8fcc646db45fe506b0cb444613c4846
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected RedLine Stealer
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ZcgffemBWp.exe (PID: 7440 cmdline: "C:\Users\user\Desktop\ZcgffemBWp.exe" MD5: 287604B42529F6196A1F8E6C4CB4C573)
    • powershell.exe (PID: 7624 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7872 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • ZcgffemBWp.exe (PID: 7656 cmdline: "C:\Users\user\Desktop\ZcgffemBWp.exe" MD5: 287604B42529F6196A1F8E6C4CB4C573)
    • ZcgffemBWp.exe (PID: 7676 cmdline: "C:\Users\user\Desktop\ZcgffemBWp.exe" MD5: 287604B42529F6196A1F8E6C4CB4C573)
    • ZcgffemBWp.exe (PID: 7712 cmdline: "C:\Users\user\Desktop\ZcgffemBWp.exe" MD5: 287604B42529F6196A1F8E6C4CB4C573)
      • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["212.162.149.77:27667"], "Bot Id": "button1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: ZcgffemBWp.exe PID: 7440JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    Process Memory Space: ZcgffemBWp.exe PID: 7712JoeSecurity_RedLineYara detected RedLine StealerJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZcgffemBWp.exe", ParentImage: C:\Users\user\Desktop\ZcgffemBWp.exe, ParentProcessId: 7440, ParentProcessName: ZcgffemBWp.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", ProcessId: 7624, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZcgffemBWp.exe", ParentImage: C:\Users\user\Desktop\ZcgffemBWp.exe, ParentProcessId: 7440, ParentProcessName: ZcgffemBWp.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", ProcessId: 7624, ProcessName: powershell.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZcgffemBWp.exe", ParentImage: C:\Users\user\Desktop\ZcgffemBWp.exe, ParentProcessId: 7440, ParentProcessName: ZcgffemBWp.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe", ProcessId: 7624, ProcessName: powershell.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 7.2.ZcgffemBWp.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["212.162.149.77:27667"], "Bot Id": "button1"}
      Source: ZcgffemBWp.exeReversingLabs: Detection: 63%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: ZcgffemBWp.exeJoe Sandbox ML: detected
      Source: ZcgffemBWp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ZcgffemBWp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Malware configuration extractorURLs: 212.162.149.77:27667
      Source: unknownDNS traffic detected: query: 206.23.85.13.in-addr.arpa replaycode: Name error (3)
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
      Source: ZcgffemBWp.exe, 00000000.00000002.1417364878.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.00000000030B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_7e74c177-b

      System Summary

      barindex
      Source: 0.2.ZcgffemBWp.exe.3fc8818.3.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_0734B5E80_2_0734B5E8
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_0734457C0_2_0734457C
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_073464E00_2_073464E0
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_07344E380_2_07344E38
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_07344E280_2_07344E28
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_07346E7F0_2_07346E7F
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_07346E900_2_07346E90
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_07344A000_2_07344A00
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 0_2_073449F00_2_073449F0
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 7_2_012EA4377_2_012EA437
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess token adjusted: SecurityJump to behavior
      Source: ZcgffemBWp.exe, 00000000.00000002.1428536790.000000000AA20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1425390082.00000000058E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1425865291.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1421061415.00000000040BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSpulebane.exe" vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1421061415.00000000040BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1421061415.0000000003F09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1416234949.000000000122E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1421061415.0000000003FAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSpulebane.exe" vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000000.00000002.1417364878.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exe, 00000007.00000002.1422265136.000000000042E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSpulebane.exe" vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exeBinary or memory string: OriginalFilenamexUTN.exe, vs ZcgffemBWp.exe
      Source: ZcgffemBWp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ZcgffemBWp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 0.2.ZcgffemBWp.exe.3fc8818.3.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.ZcgffemBWp.exe.3fc8818.3.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, y7Cwv6c5ajJPop7SjO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, y7Cwv6c5ajJPop7SjO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, MBBvcBf8kf5GGuFkOm.csSecurity API names: _0020.SetAccessControl
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, MBBvcBf8kf5GGuFkOm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, MBBvcBf8kf5GGuFkOm.csSecurity API names: _0020.AddAccessRule
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, MBBvcBf8kf5GGuFkOm.csSecurity API names: _0020.SetAccessControl
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, MBBvcBf8kf5GGuFkOm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, MBBvcBf8kf5GGuFkOm.csSecurity API names: _0020.AddAccessRule
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, y7Cwv6c5ajJPop7SjO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, y7Cwv6c5ajJPop7SjO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: classification engineClassification label: mal100.troj.evad.winEXE@12/6@1/0
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZcgffemBWp.exe.logJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7756:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7632:120:WilError_03
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zti15d4i.hxc.ps1Jump to behavior
      Source: ZcgffemBWp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: ZcgffemBWp.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: ZcgffemBWp.exeReversingLabs: Detection: 63%
      Source: unknownProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: ZcgffemBWp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: ZcgffemBWp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: ZcgffemBWp.exe, Fcontainer.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
      Source: 0.2.ZcgffemBWp.exe.58e0000.4.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, MBBvcBf8kf5GGuFkOm.cs.Net Code: ztM5FORvry System.Reflection.Assembly.Load(byte[])
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, MBBvcBf8kf5GGuFkOm.cs.Net Code: ztM5FORvry System.Reflection.Assembly.Load(byte[])
      Source: 0.2.ZcgffemBWp.exe.3f21fd8.2.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeCode function: 7_2_012EB400 push ebp; iretd 7_2_012EB465
      Source: ZcgffemBWp.exeStatic PE information: section name: .text entropy: 7.852040900033344
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, RjO3RPnTMH1KqcUWDG.csHigh entropy of concatenated method names: 'OCkn7eu6o3', 'qwGnp8NwIZ', 'b87nkp81Qd', 'Ow5ncsOXSd', 'Hn7n24U9Ng', 'd4HnR2RVjJ', 'Next', 'Next', 'Next', 'NextBytes'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, nr89pgEAhRqo2QJF5r.csHigh entropy of concatenated method names: 'os6SWey45K', 'rcuSX1HX8o', 'ToString', 'jDISBDW7Hj', 'seESy7dp0a', 'fBjShFYpAO', 'prxSdqf82U', 'FiZSEyVrph', 'mSRSAmdy8O', 'BCtSiF2iNV'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, RdpYCcw7UMt0N8clvA.csHigh entropy of concatenated method names: 'Dispose', 'rIgrII9Z77', 'YLggpQCLUY', 'agI33vWiui', 'KrWr4YV0qM', 'C0Trz2jNMv', 'ProcessDialogKey', 'VCDgxDmjHE', 't4ggrOLBhh', 'x2EggMVNOF'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, OnvPYosFf2nWMIm3kP.csHigh entropy of concatenated method names: 'KePEVphedB', 'EkJEyld4FO', 'MRIEdTB0ie', 'qJfEAa31q7', 'vBvEilNWsF', 'f5NdtjIOTQ', 'hGIdlRCxcV', 'O0WdG5VZmy', 'I0ndHgRjbL', 'wbjdI1cdUQ'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, i8AtpdtvCURvGU0NbhD.csHigh entropy of concatenated method names: 'etYPKfixyf', 'yNZPaln1Kl', 'f9vPFRRcvu', 'UYJPvlUjQa', 'pX7PoyaeYM', 'C1FPULYYjH', 'T8mPTpSA55', 'VRjPDx0MvC', 'i0VP8vhqlP', 'cu6PCO9DGq'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, MBBvcBf8kf5GGuFkOm.csHigh entropy of concatenated method names: 'fAvNV1ZZqV', 'ztYNBMHUoo', 'WksNySlScb', 'c2DNhAwE7i', 'ly0NdJw33K', 'kWXNEtNhEr', 'pisNAj5fO2', 'qZENiDl1y8', 'eGqN0ib1bX', 's7wNWbTrVv'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, uOXew4dD1eZDatbFKv.csHigh entropy of concatenated method names: 'DmXdoVvdnb', 'MrrdTVjeUi', 'a6HhkLIxex', 'cflhc2KnRk', 'QHDhRhaJDH', 'RZah1cI7xL', 'iMKhqGy3uJ', 'dYThYjIUAd', 'mJWhbCHhKO', 'sSphJjBtjk'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, eGqJt7oKvi0y967BJG.csHigh entropy of concatenated method names: 'ToString', 'p4gsjcqffC', 'xtIspUdVIu', 'aRuskrFZXY', 'eQxscily38', 'tDKsRXdnny', 'O3Ns1a5TLG', 'hQOsqWG6IX', 'PNZsYbJDXR', 'm56sbxtsIJ'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, xN3n22Jp0YXX3FHQTm.csHigh entropy of concatenated method names: 'clySHGbjil', 'vZRS4JssZX', 'm5lnxrxa3x', 'MfNnrj93y2', 'vU2SjqihVx', 'M3nSZ8nwww', 'kvASLOuq0G', 'fkUS2wr2Fa', 'f69Sf7ugEe', 'E29SMZiIPn'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, up2kaViOnATUcYntqe.csHigh entropy of concatenated method names: 'A0QPr7tXmV', 'oXAPNMy1iF', 'i83P53d8I2', 'Xr4PBkhc6m', 'KxiPyC3vEq', 'TwJPdVC5ZG', 'L01PE2ovWH', 'at6nGD6b7s', 'wDOnH2YKFB', 'FSenINu4xl'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, fy4kHNtL0suihuKkwNC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'cdFm2g93LN', 'S46mfrvFVQ', 'bZ7mMNdXgq', 'dNtmQxkJT3', 'kQJmt1uku2', 'dAHmlwMs2R', 'AvgmGDC3QY'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, xQjaQJ7ZEwHbUHQYA2.csHigh entropy of concatenated method names: 'NRnOJsEWWZ', 'ELUOZNBvO8', 'DBiO2rmdqM', 'AneOfDYWNs', 'ahaOp3cP7u', 'BK7OkiSLNH', 'xWyOcVLBPu', 'xUxORdCx3v', 'f3ZO1alnL3', 'fdXOqkUNbo'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, eRvQqLArlXcm0BVAZm.csHigh entropy of concatenated method names: 'JtBnBhO02j', 'U65nyAwoOv', 'TLvnhYsTAX', 'QV2nd6Rlvd', 'x63nEhrAGM', 'aI7nAXfd1I', 'K9knifqGK0', 'OjJn06toUL', 'cRknWM2buh', 'TNSnXLBpbp'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, o88qFSgu4m6VMRNM8P.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'dJSgIVcLwx', 's0tg4PsLgc', 'KIOgzXAJEB', 'MuuNxgorRX', 'G6FNrRP5mE', 'PtCNgbtb53', 'Af3NN4kl8k', 'y9NDUfqVik1BxlCYHC3'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, KkrvGjYCLl3uQQbnn9.csHigh entropy of concatenated method names: 'NJ5hv60fuK', 'qTkhU0THlu', 'mo7hD94AFm', 'd8Kh819my7', 'YIxhOypr7e', 'dAwhsyTED9', 'BYhhSmNQ1M', 'OKrhnakRF3', 'TBihPbXh9S', 'UYHhmqcJvM'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, gjiVYZhCPPtooM9pcg.csHigh entropy of concatenated method names: 'uRDFDPEAV', 'YZvvvRvQP', 'aBoUiOpIk', 'uVaTXoYG2', 'hkp8fxGOY', 'ThCC3PmlG', 'HLDpkDIn3nKsRatUBh', 'ls66uftl00NeFDr8mj', 'Iw6nKikxB', 'mqWmVSZxh'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, y7Cwv6c5ajJPop7SjO.csHigh entropy of concatenated method names: 'FLty2bUNiT', 'Abdyfkv118', 'jaAyM8h0yo', 'qjOyQc72ZS', 'djCytBGZ8C', 'rBayljC52x', 'nHByG3dPS0', 'y55yHpunnB', 'oU9yIJGJxy', 'seQy4Y1Yh6'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, dyU4AYbaGTu7GuQY2B.csHigh entropy of concatenated method names: 'gMJeDqp7g4', 'eIQe83pqXR', 'u7ee7bS7Pc', 'RnxepgkPmQ', 'PjPecyjhd7', 'iPOeRiSFjU', 'ewSeqgZXqO', 'n6ZeYarUQm', 'WiqeJp4p65', 'vWJej7oiAR'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, xEbooG4hGoYmSBC4jx.csHigh entropy of concatenated method names: 'NuZABeN9Gb', 'QP0AhHAR50', 'uHCAEbNJDy', 'jMmE47J4Kq', 'AfMEzYA6jJ', 'uiYAxJ5fsS', 'TtoArTri2H', 'zMWAgeFv7W', 'jmlANypBpL', 'n4PA5T6Rmk'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, NRQr7yB2nnP3x5rkFK.csHigh entropy of concatenated method names: 'UpbrAoVna6', 'lRQriunB0I', 'LpTrWG0kHm', 'qpIrXRaJPl', 'oQprOchx2F', 'WV0rsEYVaO', 'dH2FZPQjWdRxbCCpF5', 'A89B2vlaFZf5VDxOd6', 's4Zrr4o4ru', 'C2drNw3FQk'
      Source: 0.2.ZcgffemBWp.exe.70f0000.5.raw.unpack, YbODDa5X6B3PDws3lJ.csHigh entropy of concatenated method names: 'gcMAKq83Kb', 'SwvAa3pGCt', 'jBeAF3dbYK', 'GidAvy8p8s', 'iiiAoGMfTe', 'sdGAUlSLQ7', 'SjYATmKfVO', 'C5iADcqyrf', 'CyYA8VxI7v', 'xWuAC9eci1'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, RjO3RPnTMH1KqcUWDG.csHigh entropy of concatenated method names: 'OCkn7eu6o3', 'qwGnp8NwIZ', 'b87nkp81Qd', 'Ow5ncsOXSd', 'Hn7n24U9Ng', 'd4HnR2RVjJ', 'Next', 'Next', 'Next', 'NextBytes'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, nr89pgEAhRqo2QJF5r.csHigh entropy of concatenated method names: 'os6SWey45K', 'rcuSX1HX8o', 'ToString', 'jDISBDW7Hj', 'seESy7dp0a', 'fBjShFYpAO', 'prxSdqf82U', 'FiZSEyVrph', 'mSRSAmdy8O', 'BCtSiF2iNV'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, RdpYCcw7UMt0N8clvA.csHigh entropy of concatenated method names: 'Dispose', 'rIgrII9Z77', 'YLggpQCLUY', 'agI33vWiui', 'KrWr4YV0qM', 'C0Trz2jNMv', 'ProcessDialogKey', 'VCDgxDmjHE', 't4ggrOLBhh', 'x2EggMVNOF'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, OnvPYosFf2nWMIm3kP.csHigh entropy of concatenated method names: 'KePEVphedB', 'EkJEyld4FO', 'MRIEdTB0ie', 'qJfEAa31q7', 'vBvEilNWsF', 'f5NdtjIOTQ', 'hGIdlRCxcV', 'O0WdG5VZmy', 'I0ndHgRjbL', 'wbjdI1cdUQ'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, i8AtpdtvCURvGU0NbhD.csHigh entropy of concatenated method names: 'etYPKfixyf', 'yNZPaln1Kl', 'f9vPFRRcvu', 'UYJPvlUjQa', 'pX7PoyaeYM', 'C1FPULYYjH', 'T8mPTpSA55', 'VRjPDx0MvC', 'i0VP8vhqlP', 'cu6PCO9DGq'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, MBBvcBf8kf5GGuFkOm.csHigh entropy of concatenated method names: 'fAvNV1ZZqV', 'ztYNBMHUoo', 'WksNySlScb', 'c2DNhAwE7i', 'ly0NdJw33K', 'kWXNEtNhEr', 'pisNAj5fO2', 'qZENiDl1y8', 'eGqN0ib1bX', 's7wNWbTrVv'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, uOXew4dD1eZDatbFKv.csHigh entropy of concatenated method names: 'DmXdoVvdnb', 'MrrdTVjeUi', 'a6HhkLIxex', 'cflhc2KnRk', 'QHDhRhaJDH', 'RZah1cI7xL', 'iMKhqGy3uJ', 'dYThYjIUAd', 'mJWhbCHhKO', 'sSphJjBtjk'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, eGqJt7oKvi0y967BJG.csHigh entropy of concatenated method names: 'ToString', 'p4gsjcqffC', 'xtIspUdVIu', 'aRuskrFZXY', 'eQxscily38', 'tDKsRXdnny', 'O3Ns1a5TLG', 'hQOsqWG6IX', 'PNZsYbJDXR', 'm56sbxtsIJ'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, xN3n22Jp0YXX3FHQTm.csHigh entropy of concatenated method names: 'clySHGbjil', 'vZRS4JssZX', 'm5lnxrxa3x', 'MfNnrj93y2', 'vU2SjqihVx', 'M3nSZ8nwww', 'kvASLOuq0G', 'fkUS2wr2Fa', 'f69Sf7ugEe', 'E29SMZiIPn'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, up2kaViOnATUcYntqe.csHigh entropy of concatenated method names: 'A0QPr7tXmV', 'oXAPNMy1iF', 'i83P53d8I2', 'Xr4PBkhc6m', 'KxiPyC3vEq', 'TwJPdVC5ZG', 'L01PE2ovWH', 'at6nGD6b7s', 'wDOnH2YKFB', 'FSenINu4xl'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, fy4kHNtL0suihuKkwNC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'cdFm2g93LN', 'S46mfrvFVQ', 'bZ7mMNdXgq', 'dNtmQxkJT3', 'kQJmt1uku2', 'dAHmlwMs2R', 'AvgmGDC3QY'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, xQjaQJ7ZEwHbUHQYA2.csHigh entropy of concatenated method names: 'NRnOJsEWWZ', 'ELUOZNBvO8', 'DBiO2rmdqM', 'AneOfDYWNs', 'ahaOp3cP7u', 'BK7OkiSLNH', 'xWyOcVLBPu', 'xUxORdCx3v', 'f3ZO1alnL3', 'fdXOqkUNbo'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, eRvQqLArlXcm0BVAZm.csHigh entropy of concatenated method names: 'JtBnBhO02j', 'U65nyAwoOv', 'TLvnhYsTAX', 'QV2nd6Rlvd', 'x63nEhrAGM', 'aI7nAXfd1I', 'K9knifqGK0', 'OjJn06toUL', 'cRknWM2buh', 'TNSnXLBpbp'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, o88qFSgu4m6VMRNM8P.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'dJSgIVcLwx', 's0tg4PsLgc', 'KIOgzXAJEB', 'MuuNxgorRX', 'G6FNrRP5mE', 'PtCNgbtb53', 'Af3NN4kl8k', 'y9NDUfqVik1BxlCYHC3'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, KkrvGjYCLl3uQQbnn9.csHigh entropy of concatenated method names: 'NJ5hv60fuK', 'qTkhU0THlu', 'mo7hD94AFm', 'd8Kh819my7', 'YIxhOypr7e', 'dAwhsyTED9', 'BYhhSmNQ1M', 'OKrhnakRF3', 'TBihPbXh9S', 'UYHhmqcJvM'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, gjiVYZhCPPtooM9pcg.csHigh entropy of concatenated method names: 'uRDFDPEAV', 'YZvvvRvQP', 'aBoUiOpIk', 'uVaTXoYG2', 'hkp8fxGOY', 'ThCC3PmlG', 'HLDpkDIn3nKsRatUBh', 'ls66uftl00NeFDr8mj', 'Iw6nKikxB', 'mqWmVSZxh'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, y7Cwv6c5ajJPop7SjO.csHigh entropy of concatenated method names: 'FLty2bUNiT', 'Abdyfkv118', 'jaAyM8h0yo', 'qjOyQc72ZS', 'djCytBGZ8C', 'rBayljC52x', 'nHByG3dPS0', 'y55yHpunnB', 'oU9yIJGJxy', 'seQy4Y1Yh6'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, dyU4AYbaGTu7GuQY2B.csHigh entropy of concatenated method names: 'gMJeDqp7g4', 'eIQe83pqXR', 'u7ee7bS7Pc', 'RnxepgkPmQ', 'PjPecyjhd7', 'iPOeRiSFjU', 'ewSeqgZXqO', 'n6ZeYarUQm', 'WiqeJp4p65', 'vWJej7oiAR'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, xEbooG4hGoYmSBC4jx.csHigh entropy of concatenated method names: 'NuZABeN9Gb', 'QP0AhHAR50', 'uHCAEbNJDy', 'jMmE47J4Kq', 'AfMEzYA6jJ', 'uiYAxJ5fsS', 'TtoArTri2H', 'zMWAgeFv7W', 'jmlANypBpL', 'n4PA5T6Rmk'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, NRQr7yB2nnP3x5rkFK.csHigh entropy of concatenated method names: 'UpbrAoVna6', 'lRQriunB0I', 'LpTrWG0kHm', 'qpIrXRaJPl', 'oQprOchx2F', 'WV0rsEYVaO', 'dH2FZPQjWdRxbCCpF5', 'A89B2vlaFZf5VDxOd6', 's4Zrr4o4ru', 'C2drNw3FQk'
      Source: 0.2.ZcgffemBWp.exe.4254308.1.raw.unpack, YbODDa5X6B3PDws3lJ.csHigh entropy of concatenated method names: 'gcMAKq83Kb', 'SwvAa3pGCt', 'jBeAF3dbYK', 'GidAvy8p8s', 'iiiAoGMfTe', 'sdGAUlSLQ7', 'SjYATmKfVO', 'C5iADcqyrf', 'CyYA8VxI7v', 'xWuAC9eci1'

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: Process Memory Space: ZcgffemBWp.exe PID: 7440, type: MEMORYSTR
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 2F00000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 1580000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 7A90000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 8A90000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 8C30000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 9C30000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 1240000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: 1240000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7091Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2486Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exe TID: 7460Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7840Thread sleep time: -4611686018427385s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exe TID: 7820Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: ZcgffemBWp.exe, 00000000.00000002.1416234949.0000000001298000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe"
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeMemory written: C:\Users\user\Desktop\ZcgffemBWp.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeProcess created: C:\Users\user\Desktop\ZcgffemBWp.exe "C:\Users\user\Desktop\ZcgffemBWp.exe"Jump to behavior
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.00000000030B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
      Source: ZcgffemBWp.exe, 00000007.00000002.1428090782.00000000030B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Users\user\Desktop\ZcgffemBWp.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Users\user\Desktop\ZcgffemBWp.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ZcgffemBWp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: ZcgffemBWp.exe PID: 7712, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: ZcgffemBWp.exe PID: 7712, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      112
      Process Injection
      1
      Masquerading
      11
      Input Capture
      11
      Security Software Discovery
      Remote Services11
      Input Capture
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      11
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive11
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
      Software Packing
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1504223 Sample: ZcgffemBWp.exe Startdate: 04/09/2024 Architecture: WINDOWS Score: 100 29 206.23.85.13.in-addr.arpa 2->29 31 Found malware configuration 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected RedLine Stealer 2->35 37 7 other signatures 2->37 8 ZcgffemBWp.exe 4 2->8         started        signatures3 process4 file5 27 C:\Users\user\AppData\...\ZcgffemBWp.exe.log, ASCII 8->27 dropped 39 Adds a directory exclusion to Windows Defender 8->39 41 Injects a PE file into a foreign processes 8->41 12 powershell.exe 23 8->12         started        15 ZcgffemBWp.exe 3 8->15         started        17 ZcgffemBWp.exe 8->17         started        19 ZcgffemBWp.exe 8->19         started        signatures6 process7 signatures8 43 Loading BitLocker PowerShell Module 12->43 21 conhost.exe 12->21         started        23 WmiPrvSE.exe 12->23         started        45 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->45 25 conhost.exe 15->25         started        process9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      ZcgffemBWp.exe63%ReversingLabsByteCode-MSIL.Trojan.Remcos
      ZcgffemBWp.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://api.ip.sb/ip0%URL Reputationsafe
      https://api.ip.s0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
      https://discord.com/api/v9/users/0%Avira URL Cloudsafe
      212.162.149.77:276670%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      206.23.85.13.in-addr.arpa
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        212.162.149.77:27667true
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://api.ip.sb/ipZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://api.ip.sZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameZcgffemBWp.exe, 00000000.00000002.1417364878.0000000002F01000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://discord.com/api/v9/users/ZcgffemBWp.exe, 00000007.00000002.1428090782.0000000002FBE000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1504223
        Start date and time:2024-09-04 16:37:01 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 29s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:15
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:ZcgffemBWp.exe
        renamed because original name is a hash value
        Original Sample Name:b1e42e804e79dae0932a733f40a2a467a8fcc646db45fe506b0cb444613c4846.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@12/6@1/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 38
        • Number of non-executed functions: 8
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateKey calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: ZcgffemBWp.exe
        TimeTypeDescription
        10:37:56API Interceptor1x Sleep call for process: ZcgffemBWp.exe modified
        10:37:58API Interceptor13x Sleep call for process: powershell.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\ZcgffemBWp.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1216
        Entropy (8bit):5.34331486778365
        Encrypted:false
        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
        MD5:1330C80CAAC9A0FB172F202485E9B1E8
        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
        Malicious:true
        Reputation:high, very likely benign file
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):2232
        Entropy (8bit):5.379552885213346
        Encrypted:false
        SSDEEP:48:fWSU4xympjgs4Rc9tEoUl8NPZHUl7u1iMuge//YM0Uyus:fLHxvCsIcnSKRHmOug81s
        MD5:5F465B6754CD48A1A94A86E64033DB1C
        SHA1:38D3DFFEFE071ACA4955ECD7C4A926CB587F3716
        SHA-256:62A781C84C02CA755D243AF5CADCA675D6D9087BE1C02FF44FC5EC7FC99B53B7
        SHA-512:FFB7AB5BBDBD69187837D2F3D57A6CBE8D25BED5FCC2B7AF0C793617F2DF924DCF0220C2ACEC890BF84B0A9709FE79A20BF87303FE1552E974BAF5319BA3E1B7
        Malicious:false
        Reputation:low
        Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<...............V.}...@...i...........System.Transactions.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Reputation:high, very likely benign file
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Reputation:high, very likely benign file
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.845497794504431
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
        • Win32 Executable (generic) a (10002005/4) 49.75%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Windows Screen Saver (13104/52) 0.07%
        • Win16/32 Executable Delphi generic (2074/23) 0.01%
        File name:ZcgffemBWp.exe
        File size:1'034'240 bytes
        MD5:287604b42529f6196a1f8e6c4cb4c573
        SHA1:0eb2e702961172cb63691ba9a3ce3f663259dc7f
        SHA256:b1e42e804e79dae0932a733f40a2a467a8fcc646db45fe506b0cb444613c4846
        SHA512:26a1636fd326786f0230de78dece437c43c702e7b8877b5d944936e848a2c2e09af531b8e3216015fcc32213e50dbe8f86875437acded68608a3719f75244d2c
        SSDEEP:24576:Q86sEtv62AD1sqgeBnNyolFM5FxkSExPj7QNYDo:Ss0vAJj9NjFOzkSExPN
        TLSH:612512142A16D617C9A69BB81AB1F1F4177C0E9EEC01D22B9EC87EEFBD66F060C14153
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:.f..............0......(........... ........@.. ....................... ............@................................
        Icon Hash:17655bbbf04c330f
        Entrypoint:0x4fba9e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x66CD3A7F [Tue Aug 27 02:31:27 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xfba4c0x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xfc0000x235c.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000xf9aa40xf9c00347d776c70643b295aa062e5b7c10f88False0.9242719281781782data7.852040900033344IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xfc0000x235c0x2400ff43443e0135f47432a628e93fbd45b6False0.9058159722222222data7.652823825523051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x1000000xc0x400b048f3be350296b734012d4ea51fccffFalse0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xfc1000x1dfcPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.993225638353309
        RT_GROUP_ICON0xfdf0c0x14data1.05
        RT_VERSION0xfdf300x22cdata0.5
        RT_MANIFEST0xfe16c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource PortDest PortSource IPDest IP
        Sep 4, 2024 16:38:27.759044886 CEST5358031162.159.36.2192.168.2.8
        Sep 4, 2024 16:38:28.255888939 CEST5066353192.168.2.81.1.1.1
        Sep 4, 2024 16:38:28.263629913 CEST53506631.1.1.1192.168.2.8
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Sep 4, 2024 16:38:28.255888939 CEST192.168.2.81.1.1.10xcedfStandard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Sep 4, 2024 16:38:28.263629913 CEST1.1.1.1192.168.2.80xcedfName error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:10:37:55
        Start date:04/09/2024
        Path:C:\Users\user\Desktop\ZcgffemBWp.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\ZcgffemBWp.exe"
        Imagebase:0xaa0000
        File size:1'034'240 bytes
        MD5 hash:287604B42529F6196A1F8E6C4CB4C573
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:10:37:56
        Start date:04/09/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZcgffemBWp.exe"
        Imagebase:0xf80000
        File size:433'152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:10:37:56
        Start date:04/09/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6ee680000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:5
        Start time:10:37:56
        Start date:04/09/2024
        Path:C:\Users\user\Desktop\ZcgffemBWp.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\ZcgffemBWp.exe"
        Imagebase:0xf0000
        File size:1'034'240 bytes
        MD5 hash:287604B42529F6196A1F8E6C4CB4C573
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:6
        Start time:10:37:56
        Start date:04/09/2024
        Path:C:\Users\user\Desktop\ZcgffemBWp.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\ZcgffemBWp.exe"
        Imagebase:0x1c0000
        File size:1'034'240 bytes
        MD5 hash:287604B42529F6196A1F8E6C4CB4C573
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:7
        Start time:10:37:57
        Start date:04/09/2024
        Path:C:\Users\user\Desktop\ZcgffemBWp.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\ZcgffemBWp.exe"
        Imagebase:0x8a0000
        File size:1'034'240 bytes
        MD5 hash:287604B42529F6196A1F8E6C4CB4C573
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:8
        Start time:10:37:57
        Start date:04/09/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6ee680000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:9
        Start time:10:37:59
        Start date:04/09/2024
        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
        Imagebase:0x7ff605670000
        File size:496'640 bytes
        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
        Has elevated privileges:true
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:11.1%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:162
          Total number of Limit Nodes:12
          execution_graph 19200 7347edf 19201 7347fcc 19200->19201 19202 7347efb 19200->19202 19206 7348e06 19202->19206 19222 7348d98 19202->19222 19237 7348da8 19202->19237 19207 7348d94 19206->19207 19208 7348e09 19206->19208 19215 7348de6 19207->19215 19252 7349504 19207->19252 19259 7349498 19207->19259 19266 734933f 19207->19266 19273 7349653 19207->19273 19278 73491b2 19207->19278 19282 7349995 19207->19282 19287 7349234 19207->19287 19292 73499e3 19207->19292 19297 73493c2 19207->19297 19302 7349226 19207->19302 19309 7349a45 19207->19309 19314 7349485 19207->19314 19208->19201 19215->19201 19223 7348da8 19222->19223 19224 7349234 2 API calls 19223->19224 19225 7349995 2 API calls 19223->19225 19226 73491b2 2 API calls 19223->19226 19227 7349653 2 API calls 19223->19227 19228 734933f 4 API calls 19223->19228 19229 7349498 4 API calls 19223->19229 19230 7348de6 19223->19230 19231 7349504 4 API calls 19223->19231 19232 7349485 2 API calls 19223->19232 19233 7349a45 2 API calls 19223->19233 19234 7349226 4 API calls 19223->19234 19235 73493c2 2 API calls 19223->19235 19236 73499e3 2 API calls 19223->19236 19224->19230 19225->19230 19226->19230 19227->19230 19228->19230 19229->19230 19230->19201 19231->19230 19232->19230 19233->19230 19234->19230 19235->19230 19236->19230 19238 7348dc2 19237->19238 19239 7349234 2 API calls 19238->19239 19240 7349995 2 API calls 19238->19240 19241 73491b2 2 API calls 19238->19241 19242 7349653 2 API calls 19238->19242 19243 734933f 4 API calls 19238->19243 19244 7349498 4 API calls 19238->19244 19245 7348de6 19238->19245 19246 7349504 4 API calls 19238->19246 19247 7349485 2 API calls 19238->19247 19248 7349a45 2 API calls 19238->19248 19249 7349226 4 API calls 19238->19249 19250 73493c2 2 API calls 19238->19250 19251 73499e3 2 API calls 19238->19251 19239->19245 19240->19245 19241->19245 19242->19245 19243->19245 19244->19245 19245->19201 19246->19245 19247->19245 19248->19245 19249->19245 19250->19245 19251->19245 19254 734921c 19252->19254 19253 7349575 19253->19215 19254->19252 19254->19253 19319 7347380 19254->19319 19323 7347388 19254->19323 19327 7347470 19254->19327 19331 7347478 19254->19331 19335 7346db1 19259->19335 19339 7346db8 19259->19339 19260 73494b2 19343 7346d00 19260->19343 19347 7346d08 19260->19347 19261 7349a25 19267 734921c 19266->19267 19267->19266 19268 7349575 19267->19268 19269 7347380 WriteProcessMemory 19267->19269 19270 7347388 WriteProcessMemory 19267->19270 19271 7347470 ReadProcessMemory 19267->19271 19272 7347478 ReadProcessMemory 19267->19272 19268->19215 19269->19267 19270->19267 19271->19267 19272->19267 19274 7349660 19273->19274 19276 7346d00 ResumeThread 19274->19276 19277 7346d08 ResumeThread 19274->19277 19275 7349a25 19276->19275 19277->19275 19351 7347a10 19278->19351 19355 7347a0d 19278->19355 19285 7346db1 Wow64SetThreadContext 19282->19285 19286 7346db8 Wow64SetThreadContext 19282->19286 19283 73492ae 19283->19282 19284 7349a95 19283->19284 19284->19215 19285->19283 19286->19283 19288 7349247 19287->19288 19290 7347380 WriteProcessMemory 19288->19290 19291 7347388 WriteProcessMemory 19288->19291 19289 73496bc 19290->19289 19291->19289 19293 73499f8 19292->19293 19295 7346d00 ResumeThread 19293->19295 19296 7346d08 ResumeThread 19293->19296 19294 7349a25 19295->19294 19296->19294 19298 73493d4 19297->19298 19359 73472c0 19298->19359 19363 73472c8 19298->19363 19299 7349b50 19304 734921c 19302->19304 19303 7349575 19303->19215 19304->19303 19305 7347380 WriteProcessMemory 19304->19305 19306 7347388 WriteProcessMemory 19304->19306 19307 7347470 ReadProcessMemory 19304->19307 19308 7347478 ReadProcessMemory 19304->19308 19305->19304 19306->19304 19307->19304 19308->19304 19310 73492ae 19309->19310 19311 7349a95 19310->19311 19312 7346db1 Wow64SetThreadContext 19310->19312 19313 7346db8 Wow64SetThreadContext 19310->19313 19311->19215 19312->19310 19313->19310 19315 734958e 19314->19315 19317 7347380 WriteProcessMemory 19315->19317 19318 7347388 WriteProcessMemory 19315->19318 19316 734970b 19316->19215 19317->19316 19318->19316 19320 73473d0 WriteProcessMemory 19319->19320 19322 7347427 19320->19322 19322->19254 19324 73473d0 WriteProcessMemory 19323->19324 19326 7347427 19324->19326 19326->19254 19328 73474c3 ReadProcessMemory 19327->19328 19330 7347507 19328->19330 19330->19254 19332 73474c3 ReadProcessMemory 19331->19332 19334 7347507 19332->19334 19334->19254 19336 7346dfd Wow64SetThreadContext 19335->19336 19338 7346e45 19336->19338 19338->19260 19340 7346dfd Wow64SetThreadContext 19339->19340 19342 7346e45 19340->19342 19342->19260 19344 7346d08 ResumeThread 19343->19344 19346 7346d79 19344->19346 19346->19261 19348 7346d48 ResumeThread 19347->19348 19350 7346d79 19348->19350 19350->19261 19352 7347a99 CreateProcessA 19351->19352 19354 7347c5b 19352->19354 19356 7347a99 CreateProcessA 19355->19356 19358 7347c5b 19356->19358 19360 7347308 VirtualAllocEx 19359->19360 19362 7347345 19360->19362 19362->19299 19364 7347308 VirtualAllocEx 19363->19364 19366 7347345 19364->19366 19366->19299 19385 734a028 19386 734a1b3 19385->19386 19388 734a04e 19385->19388 19388->19386 19389 73476e8 19388->19389 19390 734a2a8 PostMessageW 19389->19390 19391 734a314 19390->19391 19391->19388 19367 156ee38 19370 156ef30 19367->19370 19368 156ee47 19371 156ef41 19370->19371 19372 156ef64 19370->19372 19371->19372 19377 156f1c8 19371->19377 19372->19368 19373 156ef5c 19373->19372 19374 156f168 GetModuleHandleW 19373->19374 19375 156f195 19374->19375 19375->19368 19378 156f1dc 19377->19378 19379 156f201 19378->19379 19381 156e960 19378->19381 19379->19373 19382 156f3a8 LoadLibraryExW 19381->19382 19384 156f421 19382->19384 19384->19379 19392 1564668 19393 156467a 19392->19393 19394 1564686 19393->19394 19396 1564778 19393->19396 19397 156479d 19396->19397 19401 1564888 19397->19401 19405 1564879 19397->19405 19403 15648af 19401->19403 19402 156498c 19402->19402 19403->19402 19409 15644b4 19403->19409 19407 1564888 19405->19407 19406 156498c 19407->19406 19408 15644b4 CreateActCtxA 19407->19408 19408->19406 19410 1565918 CreateActCtxA 19409->19410 19412 15659db 19410->19412
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2eabe2ab24867617b8d8617c61035fd06eff3982fa9aedfc50b0e316d2dda898
          • Instruction ID: 6a728853e4041b4ad407e7f1b71e340d0138ce046fdb9a9c187a389b3dcb24b1
          • Opcode Fuzzy Hash: 2eabe2ab24867617b8d8617c61035fd06eff3982fa9aedfc50b0e316d2dda898
          • Instruction Fuzzy Hash: 11D1CBF17012069FFB29DB75C8507AEB7EAAF89600F14886DD1499B290DB35E801CB91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 111 7347a10-7347aa5 113 7347aa7-7347ab1 111->113 114 7347ade-7347afe 111->114 113->114 115 7347ab3-7347ab5 113->115 121 7347b37-7347b66 114->121 122 7347b00-7347b0a 114->122 116 7347ab7-7347ac1 115->116 117 7347ad8-7347adb 115->117 119 7347ac5-7347ad4 116->119 120 7347ac3 116->120 117->114 119->119 123 7347ad6 119->123 120->119 128 7347b9f-7347c59 CreateProcessA 121->128 129 7347b68-7347b72 121->129 122->121 124 7347b0c-7347b0e 122->124 123->117 126 7347b10-7347b1a 124->126 127 7347b31-7347b34 124->127 130 7347b1c 126->130 131 7347b1e-7347b2d 126->131 127->121 142 7347c62-7347ce8 128->142 143 7347c5b-7347c61 128->143 129->128 132 7347b74-7347b76 129->132 130->131 131->131 133 7347b2f 131->133 134 7347b78-7347b82 132->134 135 7347b99-7347b9c 132->135 133->127 137 7347b84 134->137 138 7347b86-7347b95 134->138 135->128 137->138 138->138 139 7347b97 138->139 139->135 153 7347cf8-7347cfc 142->153 154 7347cea-7347cee 142->154 143->142 155 7347d0c-7347d10 153->155 156 7347cfe-7347d02 153->156 154->153 157 7347cf0 154->157 159 7347d20-7347d24 155->159 160 7347d12-7347d16 155->160 156->155 158 7347d04 156->158 157->153 158->155 162 7347d36-7347d3d 159->162 163 7347d26-7347d2c 159->163 160->159 161 7347d18 160->161 161->159 164 7347d54 162->164 165 7347d3f-7347d4e 162->165 163->162 166 7347d55 164->166 165->164 166->166
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07347C46
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: c4d5b68aa6f91e20fc1fb67862b69b843a4c5c539f488b45f159d355e516fb1d
          • Instruction ID: 3c538cf4be1f85ecd7f5928b1156380e51bf0ba5c4e6da062904d3eaafaa2893
          • Opcode Fuzzy Hash: c4d5b68aa6f91e20fc1fb67862b69b843a4c5c539f488b45f159d355e516fb1d
          • Instruction Fuzzy Hash: D4914BB1D0025ADFEF24CF68C841BEDBBF6BB44310F148569E858A7240DB74AA85CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 54 7347a0d-7347aa5 56 7347aa7-7347ab1 54->56 57 7347ade-7347afe 54->57 56->57 58 7347ab3-7347ab5 56->58 64 7347b37-7347b66 57->64 65 7347b00-7347b0a 57->65 59 7347ab7-7347ac1 58->59 60 7347ad8-7347adb 58->60 62 7347ac5-7347ad4 59->62 63 7347ac3 59->63 60->57 62->62 66 7347ad6 62->66 63->62 71 7347b9f-7347c59 CreateProcessA 64->71 72 7347b68-7347b72 64->72 65->64 67 7347b0c-7347b0e 65->67 66->60 69 7347b10-7347b1a 67->69 70 7347b31-7347b34 67->70 73 7347b1c 69->73 74 7347b1e-7347b2d 69->74 70->64 85 7347c62-7347ce8 71->85 86 7347c5b-7347c61 71->86 72->71 75 7347b74-7347b76 72->75 73->74 74->74 76 7347b2f 74->76 77 7347b78-7347b82 75->77 78 7347b99-7347b9c 75->78 76->70 80 7347b84 77->80 81 7347b86-7347b95 77->81 78->71 80->81 81->81 82 7347b97 81->82 82->78 96 7347cf8-7347cfc 85->96 97 7347cea-7347cee 85->97 86->85 98 7347d0c-7347d10 96->98 99 7347cfe-7347d02 96->99 97->96 100 7347cf0 97->100 102 7347d20-7347d24 98->102 103 7347d12-7347d16 98->103 99->98 101 7347d04 99->101 100->96 101->98 105 7347d36-7347d3d 102->105 106 7347d26-7347d2c 102->106 103->102 104 7347d18 103->104 104->102 107 7347d54 105->107 108 7347d3f-7347d4e 105->108 106->105 109 7347d55 107->109 108->107 109->109
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07347C46
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 54a5b7faa4e5a338abba024d5c01c962983c3ba6aada475485998437b83cd728
          • Instruction ID: 7784eb0081174492adec0dbf5632e7742beb5b0b38fd30ee3d284ecc497cbd75
          • Opcode Fuzzy Hash: 54a5b7faa4e5a338abba024d5c01c962983c3ba6aada475485998437b83cd728
          • Instruction Fuzzy Hash: 4B914BB1D0025ADFEF24CF68C841BEDBBF2BB44310F148569E858A7240DB74AA85CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 168 156ef30-156ef3f 169 156ef41-156ef4e call 156c478 168->169 170 156ef6b-156ef6f 168->170 177 156ef64 169->177 178 156ef50-156ef5e call 156f1c8 169->178 171 156ef83-156efc4 170->171 172 156ef71-156ef7b 170->172 179 156efc6-156efce 171->179 180 156efd1-156efdf 171->180 172->171 177->170 178->177 184 156f0a0-156f160 178->184 179->180 182 156f003-156f005 180->182 183 156efe1-156efe6 180->183 185 156f008-156f00f 182->185 186 156eff1 183->186 187 156efe8-156efef call 156e904 183->187 219 156f162-156f165 184->219 220 156f168-156f193 GetModuleHandleW 184->220 189 156f011-156f019 185->189 190 156f01c-156f023 185->190 188 156eff3-156f001 186->188 187->188 188->185 189->190 193 156f025-156f02d 190->193 194 156f030-156f039 call 156e914 190->194 193->194 199 156f046-156f04b 194->199 200 156f03b-156f043 194->200 201 156f04d-156f054 199->201 202 156f069-156f076 199->202 200->199 201->202 204 156f056-156f066 call 156e924 call 156e934 201->204 209 156f078-156f096 202->209 210 156f099-156f09f 202->210 204->202 209->210 219->220 221 156f195-156f19b 220->221 222 156f19c-156f1b0 220->222 221->222
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0156F186
          Memory Dump Source
          • Source File: 00000000.00000002.1417142929.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1560000_ZcgffemBWp.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: a7b4c50d2c0b78b8f77ae6f8de6bfe44e494cc6d85dbf700bdbdffd3768fe0e7
          • Instruction ID: b000cca4d10e44d688545ee56bc6ddfe69713690dc727143835519dcef890e09
          • Opcode Fuzzy Hash: a7b4c50d2c0b78b8f77ae6f8de6bfe44e494cc6d85dbf700bdbdffd3768fe0e7
          • Instruction Fuzzy Hash: 0C715770A00B058FDB24DF2AD45579ABBF9FF88714F00892ED08ADBA50DB75E845CB91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 225 15644b4-15659d9 CreateActCtxA 228 15659e2-1565a3c 225->228 229 15659db-15659e1 225->229 236 1565a3e-1565a41 228->236 237 1565a4b-1565a4f 228->237 229->228 236->237 238 1565a60 237->238 239 1565a51-1565a5d 237->239 240 1565a61 238->240 239->238 240->240
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 015659C9
          Memory Dump Source
          • Source File: 00000000.00000002.1417142929.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1560000_ZcgffemBWp.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 5f526704e0404099ab66971e3f64824b9c5dab2d78ea91bd4e5c776e19c72782
          • Instruction ID: 968613d3ad4f39b97f04534a123851c931f90ff0c93521a4ee50d7eb950ff831
          • Opcode Fuzzy Hash: 5f526704e0404099ab66971e3f64824b9c5dab2d78ea91bd4e5c776e19c72782
          • Instruction Fuzzy Hash: A341BF70C0071DCBDB24DFA9C884B9EBBF5BF49704F20856AD508AB251DBB56945CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 242 156590c-1565912 243 1565918-15659d9 CreateActCtxA 242->243 245 15659e2-1565a3c 243->245 246 15659db-15659e1 243->246 253 1565a3e-1565a41 245->253 254 1565a4b-1565a4f 245->254 246->245 253->254 255 1565a60 254->255 256 1565a51-1565a5d 254->256 257 1565a61 255->257 256->255 257->257
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 015659C9
          Memory Dump Source
          • Source File: 00000000.00000002.1417142929.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1560000_ZcgffemBWp.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 535a5d22b4e2ae7ad6f13aad05d3c0e918d8a3f87c32b24bcbb70e4d19c1eed7
          • Instruction ID: 285891792abc5713685e8e07bbc8919a6bc41ef531835869bb458c41c621d1b4
          • Opcode Fuzzy Hash: 535a5d22b4e2ae7ad6f13aad05d3c0e918d8a3f87c32b24bcbb70e4d19c1eed7
          • Instruction Fuzzy Hash: B541BF71C00719CBDB24CFA9C884BCEBBB5BF49704F20856AD508AB251DBB56945CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 259 7347380-73473d6 261 73473e6-7347425 WriteProcessMemory 259->261 262 73473d8-73473e4 259->262 264 7347427-734742d 261->264 265 734742e-734745e 261->265 262->261 264->265
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07347418
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: a7cacb686d483edb313f09dffab700f4a964e2aeaadbc245386e907727a8c02d
          • Instruction ID: 877d3e3728c0c0a0a347e9d2196c5b0e862b0e0354907bc6a1a2e7963c3b1a59
          • Opcode Fuzzy Hash: a7cacb686d483edb313f09dffab700f4a964e2aeaadbc245386e907727a8c02d
          • Instruction Fuzzy Hash: 5F2135B59003199FDB10CFA9C985BEEBBF5FF48310F10882AE958A7250C7789955CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 269 7347388-73473d6 271 73473e6-7347425 WriteProcessMemory 269->271 272 73473d8-73473e4 269->272 274 7347427-734742d 271->274 275 734742e-734745e 271->275 272->271 274->275
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07347418
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 9e20982535fd7565595cb988ee07409e5eaa65875f975bf71bc2935c6ef84be3
          • Instruction ID: f045d46548ee52ae39b941c4cd9ff78d7cc835ce472a401b45b2ff0cdb4c235e
          • Opcode Fuzzy Hash: 9e20982535fd7565595cb988ee07409e5eaa65875f975bf71bc2935c6ef84be3
          • Instruction Fuzzy Hash: ED213BB59003599FDF14CFAAC885BDEBBF5FF48310F10842AE918A7240D7789554CBA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 279 7347470-7347505 ReadProcessMemory 282 7347507-734750d 279->282 283 734750e-734753e 279->283 282->283
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073474F8
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: c9f2a91a11f0277bdc3e2bc4d31b30e5dc9549ec940d648e0adb24ed368fad0c
          • Instruction ID: 4d05d3149965c2267242cc49b8f0fb0ea4411f3516343499886b8523341f8f7b
          • Opcode Fuzzy Hash: c9f2a91a11f0277bdc3e2bc4d31b30e5dc9549ec940d648e0adb24ed368fad0c
          • Instruction Fuzzy Hash: 8D2136B58002599FDB10CFAAC980BEEFBF5FF48310F10882AE519A7250D7389955DFA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 287 7346db1-7346e03 289 7346e05-7346e11 287->289 290 7346e13-7346e43 Wow64SetThreadContext 287->290 289->290 292 7346e45-7346e4b 290->292 293 7346e4c-7346e7c 290->293 292->293
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07346E36
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 7e7c1235e901dcaf79d167d0fbad22961ed98dfd495c2ce25a70ab433a544a95
          • Instruction ID: 23893acfcb69fab7aca8010cbed74b9c90b44da2a14077e5535d815cfa60f39a
          • Opcode Fuzzy Hash: 7e7c1235e901dcaf79d167d0fbad22961ed98dfd495c2ce25a70ab433a544a95
          • Instruction Fuzzy Hash: 052129B2D003098FEB14DFAAC5857EEFBF5AF88314F14842AD459A7240C7799685CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 297 7346db8-7346e03 299 7346e05-7346e11 297->299 300 7346e13-7346e43 Wow64SetThreadContext 297->300 299->300 302 7346e45-7346e4b 300->302 303 7346e4c-7346e7c 300->303 302->303
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07346E36
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: a7c89a7733199daf53766905a9b96bea9893365496d679aa62c1d64ae2a778ef
          • Instruction ID: 9fe6cfe0ad46bcd320da6649af7186b7895110863bc9bc738c20f42a54e0e601
          • Opcode Fuzzy Hash: a7c89a7733199daf53766905a9b96bea9893365496d679aa62c1d64ae2a778ef
          • Instruction Fuzzy Hash: 202138B19003098FEB14DFAAC5857EEFBF4AF88310F14842AD419A7240C779A945CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 307 7347478-7347505 ReadProcessMemory 310 7347507-734750d 307->310 311 734750e-734753e 307->311 310->311
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073474F8
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: d6dbdd71882b57812b6b0f5308f5943142a16bec1ebf1df1a8c1cae360d3e56e
          • Instruction ID: 86ef019a59b862e91c12e84b1325fb94b1019e0ca76ecbb917ff63f175aedc7a
          • Opcode Fuzzy Hash: d6dbdd71882b57812b6b0f5308f5943142a16bec1ebf1df1a8c1cae360d3e56e
          • Instruction Fuzzy Hash: 302128B18003599FDB10DFAAC880BEEFBF5FF48310F10842AE519A7240D7789501CBA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 315 156e960-156f3e8 317 156f3f0-156f41f LoadLibraryExW 315->317 318 156f3ea-156f3ed 315->318 319 156f421-156f427 317->319 320 156f428-156f445 317->320 318->317 319->320
          APIs
          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0156F201,00000800,00000000,00000000), ref: 0156F412
          Memory Dump Source
          • Source File: 00000000.00000002.1417142929.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1560000_ZcgffemBWp.jbxd
          Similarity
          • API ID: LibraryLoad
          • String ID:
          • API String ID: 1029625771-0
          • Opcode ID: 4c6b82f6bd73fcf3ad6d94f96d2ad9c6ebdbb25e74fdb0af459988c9cbf26ecf
          • Instruction ID: f71f11572b170fe82c1f7e297d4dd632b37dab415913547cb1cc3752ce16e511
          • Opcode Fuzzy Hash: 4c6b82f6bd73fcf3ad6d94f96d2ad9c6ebdbb25e74fdb0af459988c9cbf26ecf
          • Instruction Fuzzy Hash: 321114B6D043489FDB10CF9AD444ADEFBF8FB88310F10842AE519A7600C375A545CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 323 73472c8-7347343 VirtualAllocEx 326 7347345-734734b 323->326 327 734734c-7347371 323->327 326->327
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07347336
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 95922cef02d8cfd3fb349a82af90f9aba0e0beb9fcd50228102539c9a6178e23
          • Instruction ID: b6902451ece5cd398d73139e0b8cd7ef99003f6821b2e14f10d890df0f890b29
          • Opcode Fuzzy Hash: 95922cef02d8cfd3fb349a82af90f9aba0e0beb9fcd50228102539c9a6178e23
          • Instruction Fuzzy Hash: AF1126728003499FDB14DFAAC844BDEBBF5AF88310F14881AE919A7250C775A554CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 331 7346d00-7346d77 ResumeThread 335 7346d80-7346da5 331->335 336 7346d79-7346d7f 331->336 336->335
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: 14a9371a7a79b2fa52bd13b8579e5bf25150a8c6f72f2183732302d4a35a6b5e
          • Instruction ID: 3287c4a0e5a54e6d15eda2c0195deac16a0d9c71ee6ae2e4d96ff0e446d0749f
          • Opcode Fuzzy Hash: 14a9371a7a79b2fa52bd13b8579e5bf25150a8c6f72f2183732302d4a35a6b5e
          • Instruction Fuzzy Hash: DD115BB19003488BDB24DFAAC4457DFFBF4AF88710F20841AD419A7640DB75A540CFA5
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07347336
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: b285a1254787435685f1635ba04e185a223726168a0b1ba3d8b33ab358912b5d
          • Instruction ID: e5c7d306d93c8b0089006b92ed7c6a8c54c47d15ac3e7e6e7f7cb2af14b34236
          • Opcode Fuzzy Hash: b285a1254787435685f1635ba04e185a223726168a0b1ba3d8b33ab358912b5d
          • Instruction Fuzzy Hash: 241156769003499FDB14CFA9C940BEEFBF5EF48310F24881AE569A7650C775A500CFA4
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: 345b1b20b3bff7c2ec6d58099fcd33c4feae68262f6516f8d03b5ffe4959a2ec
          • Instruction ID: 009e3a2395ca922662cb9e6b9d8117e551c12423d360019dec77a4b3229bd693
          • Opcode Fuzzy Hash: 345b1b20b3bff7c2ec6d58099fcd33c4feae68262f6516f8d03b5ffe4959a2ec
          • Instruction Fuzzy Hash: 04113AB19003498FDB24DFAAC4457DEFBF4AF88614F24881AD419A7250C775A544CFA4
          APIs
          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0734A305
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 2da34cc39050c1d23af1d7c0455c7e3bfb69ec6a20e251d48f99784cb699d01c
          • Instruction ID: 69dc2d6d7de3f15be47d67b72e611263ceda8862ca1572825efb4890d98c2e30
          • Opcode Fuzzy Hash: 2da34cc39050c1d23af1d7c0455c7e3bfb69ec6a20e251d48f99784cb699d01c
          • Instruction Fuzzy Hash: B11103B58002499FDB10CF9AD584BDEFBF8EB48724F10881AE558A7640C375A644CFA1
          APIs
          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0734A305
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 442c8bddfb7202c3b0cf9ab5185ba373a7a0c733283c98e771c56bdead2e86e3
          • Instruction ID: 4174b7c145f61cc31d1fb30680f89dccaf884326b24e785c292285083cfcd947
          • Opcode Fuzzy Hash: 442c8bddfb7202c3b0cf9ab5185ba373a7a0c733283c98e771c56bdead2e86e3
          • Instruction Fuzzy Hash: E11115B5804349DFDB20CF9AC885BDEFBF8EB48314F10845AE518A7640D375A954CFA1
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0156F186
          Memory Dump Source
          • Source File: 00000000.00000002.1417142929.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_1560000_ZcgffemBWp.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: bf3a50017e7c7472c15161cb5dc52dee9b136d300f29016d84d54f35f258f5f6
          • Instruction ID: a484b8a535ef104a05b46edd51a11c5f6fe0b8e553b30af5b4cb8f654afba87f
          • Opcode Fuzzy Hash: bf3a50017e7c7472c15161cb5dc52dee9b136d300f29016d84d54f35f258f5f6
          • Instruction Fuzzy Hash: 34110FB5C002498FDB10CF9AD844ADEFBF8AF89220F10841AD428A7200C375A545CFA1
          Memory Dump Source
          • Source File: 00000000.00000002.1416808713.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_146d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0386f29738b45987d71be753c8f13a567c3c93b53152f274e1c230939c4ea266
          • Instruction ID: 17932eb60bf0e1688e4e271616c32049e0d60307bc5feab2a62382ed6026ffde
          • Opcode Fuzzy Hash: 0386f29738b45987d71be753c8f13a567c3c93b53152f274e1c230939c4ea266
          • Instruction Fuzzy Hash: 4A2106B1A04240DFDB05DF54D9C0B27BBA9FB8831CF20856AE9490B666C336D456CAA3
          Memory Dump Source
          • Source File: 00000000.00000002.1416866346.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_147d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 46250130008bb9a47088e59fc03c0cdb49b272cbfcfd0f0ed4ec0a40a4ec13a0
          • Instruction ID: cb1fabce3dbc49ae63cecc34140e25eb6c62b8f2c8c2404e5ed9d5293c3d552d
          • Opcode Fuzzy Hash: 46250130008bb9a47088e59fc03c0cdb49b272cbfcfd0f0ed4ec0a40a4ec13a0
          • Instruction Fuzzy Hash: 3821F271A14200EFDB15DFA4D9C0B66BBA5FF84324F24C5AEE9494B362C336D447CA61
          Memory Dump Source
          • Source File: 00000000.00000002.1416866346.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_147d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e0a1a14009173aa3bc2383372dd2190bbad4498bcc1c6c6b42555179dd5fcaa6
          • Instruction ID: a197df66c65efe1fb12b0739033ae6187e51da81e5313136f6e59e54a006f7ef
          • Opcode Fuzzy Hash: e0a1a14009173aa3bc2383372dd2190bbad4498bcc1c6c6b42555179dd5fcaa6
          • Instruction Fuzzy Hash: 672103B1904280DFDB16DF64D980B56BBA1FF84218F20C56EE80A0B366C336D447CA61
          Memory Dump Source
          • Source File: 00000000.00000002.1416866346.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_147d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 675d70425b327b1f3b2524519f4f9bce11ab3cafa5bdcaa7669cb00e34ab836f
          • Instruction ID: bf03a2d2c4cf466be570aac03a9d5205ee7a9f83e4afff59511ba032ce002d81
          • Opcode Fuzzy Hash: 675d70425b327b1f3b2524519f4f9bce11ab3cafa5bdcaa7669cb00e34ab836f
          • Instruction Fuzzy Hash: 4E217F755093C08FCB03CF24D994756BF71EF46218F28C5DAD8498B6A7C33A984ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.1416808713.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_146d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
          • Instruction ID: 5cf7368d2ada2997dbf1827210d5640a03c74b876f8a74e7249b5b683770d9ca
          • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
          • Instruction Fuzzy Hash: D011B176904280CFCB16CF54D5C4B16BF71FB84318F2485AAD8494B667C336D45ACBA2
          Memory Dump Source
          • Source File: 00000000.00000002.1416866346.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_147d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fb11cfc8073ccb158cd0f42583cdb3ded50e3effa001a3c93aefd0de24dc37f6
          • Instruction ID: 15f3a4e228d27f73c679df712ed99cb0d9c8e21cfc4c6c26186e870f332fa315
          • Opcode Fuzzy Hash: fb11cfc8073ccb158cd0f42583cdb3ded50e3effa001a3c93aefd0de24dc37f6
          • Instruction Fuzzy Hash: B411BB75904280DFCB12CF54C5C4B16BFA1FF84228F28C6AAD8494B7A6C33AD44ACB61
          Memory Dump Source
          • Source File: 00000000.00000002.1416808713.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_146d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a519fcb1a059de29250c7c28c68b849c5a5b410164019e5e6c08bf0d54582085
          • Instruction ID: 3eb879263e4eb9ebfeb6fe3e3019fed5bbebff8c654fb1534bff29f4cedcbabd
          • Opcode Fuzzy Hash: a519fcb1a059de29250c7c28c68b849c5a5b410164019e5e6c08bf0d54582085
          • Instruction Fuzzy Hash: 4F01A771A04384ABE7105AA5CD84767BBDCEF81629F18C56BED494A2A2C77C9840C6B3
          Memory Dump Source
          • Source File: 00000000.00000002.1416808713.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_146d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c476bebb415e5a7e8fe6f489eab7f19998aa5dcef61cd86bb3ff01380b47a1f6
          • Instruction ID: 01b17fe56a58cd5ccf9fce701403ced8d436e7a091825c6df9e2a08620b3b0ef
          • Opcode Fuzzy Hash: c476bebb415e5a7e8fe6f489eab7f19998aa5dcef61cd86bb3ff01380b47a1f6
          • Instruction Fuzzy Hash: C2F06271504384AFE7108E1AC984B67FFDCEB81639F18C55AED485F297C2799844CAB2
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d87143937a5fc852c6938958f9ed07cd7cafcfc23e269d034646566439a57214
          • Instruction ID: 9472d696cfc7667741a5edb98a59c4deb0595a34740f9ae59708e764784373c5
          • Opcode Fuzzy Hash: d87143937a5fc852c6938958f9ed07cd7cafcfc23e269d034646566439a57214
          • Instruction Fuzzy Hash: 50E14DB4E042598FDB14DFA8C580AADFBF2BF89304F2481A9D458AB355D730AD42CF65
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2df323af6fa423ae66df86f288e4f9f88fc1a790005c297647237fb7a0e11ab4
          • Instruction ID: 749325f26a1e62e8049bd0d1e8d77a3356a358a27a5552634f00af180940dab0
          • Opcode Fuzzy Hash: 2df323af6fa423ae66df86f288e4f9f88fc1a790005c297647237fb7a0e11ab4
          • Instruction Fuzzy Hash: CFE10BB4E002598FDB14DFA8C580AAEFBF2BF89305F248169D459AB355D730AD42CF64
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 007a49ffe3aa2474cc5b2ba232917e13e8161c7aa99a341799187963bb191809
          • Instruction ID: 09068343e053027a9b79856d61aff680c75d2636cb5f30aa543a75cc567301f7
          • Opcode Fuzzy Hash: 007a49ffe3aa2474cc5b2ba232917e13e8161c7aa99a341799187963bb191809
          • Instruction Fuzzy Hash: 7DE10BB4E002198FDB14DF98C580AAEFBF2BF89305F248169D419AB355D731AD41CF65
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1e2d825e46c93f9de776e75be0cfb93001bb56407fffe097eca1e1e3e2aba875
          • Instruction ID: 715954c1489e0f86c3786012d17d2da8bc45d5891f8327142f1151314328fa95
          • Opcode Fuzzy Hash: 1e2d825e46c93f9de776e75be0cfb93001bb56407fffe097eca1e1e3e2aba875
          • Instruction Fuzzy Hash: 53E118B4E002198FDB18DFA8C5849AEFBF2FF89304F248169D419AB355D731A942CF65
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8a72e58d93b36af104a55a486f5f57460f226f4abb7a7ada6af9f8d174e52986
          • Instruction ID: aa2a596b5d3b3387de7d2242b113d4b6739ccae998a50016eb2439dc3b30d0bd
          • Opcode Fuzzy Hash: 8a72e58d93b36af104a55a486f5f57460f226f4abb7a7ada6af9f8d174e52986
          • Instruction Fuzzy Hash: 5EE1F8B4E00219CFDB18DF98C591AAEBBF2BF89305F248169D419AB355D730A942CF64
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0d780a017196e1b8826ea9753cd5b0787160a4b49001ce6a4c1ab97aa26bfef3
          • Instruction ID: a0e8eb04fdb510344d680af984722550aa3bc93f088d80c34a0e1dc540d207ee
          • Opcode Fuzzy Hash: 0d780a017196e1b8826ea9753cd5b0787160a4b49001ce6a4c1ab97aa26bfef3
          • Instruction Fuzzy Hash: B65130B4E002198FDB18DF69C9855AEFBF2FF89304F248169D448A7355D731A942CFA1
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a79e858e2bb3c2542f35c65abc102107e3b19e89fb58076a33a33ead7cb0f28d
          • Instruction ID: 5b7e91d3a6c45d2e5c8d9f9323cd6c2f0d712a731195d142c2beeace3234638d
          • Opcode Fuzzy Hash: a79e858e2bb3c2542f35c65abc102107e3b19e89fb58076a33a33ead7cb0f28d
          • Instruction Fuzzy Hash: 8A512EB4E002598FDB18DFA9C5806AEFBF2BF89304F24C169D418A7355D731A942CF65
          Memory Dump Source
          • Source File: 00000000.00000002.1426518679.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 07340000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7340000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 82477309be56db1538f9a9e49832adf709d5054171a0511ce4ab56b2ab724adb
          • Instruction ID: 7fc9885a058f251a56f607ecf915a079fe00f8001225242cbf2ffc87625faec9
          • Opcode Fuzzy Hash: 82477309be56db1538f9a9e49832adf709d5054171a0511ce4ab56b2ab724adb
          • Instruction Fuzzy Hash: CE511CB1E002198FDB18DFA9C5806AEFBF2BF89304F24C169D458A7355D731A942CFA4

          Execution Graph

          Execution Coverage:16.1%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:25
          Total number of Limit Nodes:1
          execution_graph 12610 12e4810 12611 12e482c 12610->12611 12616 12e4890 12611->12616 12612 12e4838 12613 12e485d 12612->12613 12621 12eb3c8 12612->12621 12617 12e48bc 12616->12617 12626 12eac89 12617->12626 12630 12eac90 12617->12630 12618 12e490f 12618->12612 12622 12eb3ed 12621->12622 12634 12eb4d8 12622->12634 12638 12eb4c9 12622->12638 12627 12eacd1 GetConsoleWindow 12626->12627 12629 12ead12 12627->12629 12629->12618 12631 12eacd1 GetConsoleWindow 12630->12631 12633 12ead12 12631->12633 12633->12618 12636 12eb4ff 12634->12636 12635 12eb5dc 12635->12635 12636->12635 12642 12eb0ec 12636->12642 12640 12eb4d8 12638->12640 12639 12eb5dc 12639->12639 12640->12639 12641 12eb0ec CreateActCtxA 12640->12641 12641->12639 12643 12ec590 CreateActCtxA 12642->12643 12645 12ec696 12643->12645

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1991 12ec585-12ec626 1994 12ec62d-12ec694 CreateActCtxA 1991->1994 1996 12ec69d-12ec722 1994->1996 1997 12ec696-12ec69c 1994->1997 2006 12ec74f-12ec757 1996->2006 2007 12ec724-12ec734 1996->2007 1997->1996 2010 12ec758 2006->2010 2011 12ec73b-12ec747 2007->2011 2010->2010 2011->2006
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 012EC681
          Memory Dump Source
          • Source File: 00000007.00000002.1426191975.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_12e0000_ZcgffemBWp.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 70ddf77efd2f30a93395566d1a5959e4de64cc47f7fbb6fe40314290510e15f6
          • Instruction ID: 4f069dbc302a208142b83018cf634c4104c81cc587f5c1128e17a00ebf6d4767
          • Opcode Fuzzy Hash: 70ddf77efd2f30a93395566d1a5959e4de64cc47f7fbb6fe40314290510e15f6
          • Instruction Fuzzy Hash: 3F51D271D04218CFEB24CFA9C844BDEBBF5BF49300F1094AAD509AB251DB716A89CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2012 12eb0ec-12ec694 CreateActCtxA 2017 12ec69d-12ec722 2012->2017 2018 12ec696-12ec69c 2012->2018 2027 12ec74f-12ec757 2017->2027 2028 12ec724-12ec747 2017->2028 2018->2017 2031 12ec758 2027->2031 2028->2027 2031->2031
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 012EC681
          Memory Dump Source
          • Source File: 00000007.00000002.1426191975.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_12e0000_ZcgffemBWp.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 36b32bc613a02574063cc4877e884d585866dfdbffafdb90e82f45b82aa56021
          • Instruction ID: 707c8ae3ef6b1ce4fde64cb72e8c64ceb5a0df33f042cdf7f688a0c678c0ed2f
          • Opcode Fuzzy Hash: 36b32bc613a02574063cc4877e884d585866dfdbffafdb90e82f45b82aa56021
          • Instruction Fuzzy Hash: 4F51C171D053188FDB24DFA9C844BCEBBF5BF49300F1094AA9509AB251DB716A89CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2033 12eac89-12ead10 GetConsoleWindow 2036 12ead19-12ead59 2033->2036 2037 12ead12-12ead18 2033->2037 2037->2036
          APIs
          • GetConsoleWindow.KERNELBASE ref: 012EAD00
          Memory Dump Source
          • Source File: 00000007.00000002.1426191975.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_12e0000_ZcgffemBWp.jbxd
          Similarity
          • API ID: ConsoleWindow
          • String ID:
          • API String ID: 2863861424-0
          • Opcode ID: d19265d3932a923635955c2350ecb6acdb1569f1245dee0929cb6f484de272dc
          • Instruction ID: d4551f393d21da200fb7f4fc9d62a607ea541823c250328f0f03475b74fbe4ac
          • Opcode Fuzzy Hash: d19265d3932a923635955c2350ecb6acdb1569f1245dee0929cb6f484de272dc
          • Instruction Fuzzy Hash: 2321FAB4D05209CFDB14DFA9D585ADEFBF5AF48320F24842AE419B7240C7396901CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2042 12eac90-12ead10 GetConsoleWindow 2045 12ead19-12ead59 2042->2045 2046 12ead12-12ead18 2042->2046 2046->2045
          APIs
          • GetConsoleWindow.KERNELBASE ref: 012EAD00
          Memory Dump Source
          • Source File: 00000007.00000002.1426191975.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_12e0000_ZcgffemBWp.jbxd
          Similarity
          • API ID: ConsoleWindow
          • String ID:
          • API String ID: 2863861424-0
          • Opcode ID: 005bc3dc9688d68010325fb84b601b20618d8ea413eb118c65edc9da45745b6b
          • Instruction ID: 1f5ae361052ddecbaa285545700b9e455ec9cfbd6d3d2906dcb616b713d6a199
          • Opcode Fuzzy Hash: 005bc3dc9688d68010325fb84b601b20618d8ea413eb118c65edc9da45745b6b
          • Instruction Fuzzy Hash: E421EBB4D012088FDB14CFA9D585ADEFBF4AF48320F24842AE419B7340C739A901CFA4
          Memory Dump Source
          • Source File: 00000007.00000002.1425185301.000000000119D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0119D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_119d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ac775c79fda488bd9be0cac472ed294f0be4538626d4af2e95780ed786128e78
          • Instruction ID: 2f3357d92e9ff1d65985a9f5675d6fbc1b2b619a34b03f7ee9a8bd60040ca2e1
          • Opcode Fuzzy Hash: ac775c79fda488bd9be0cac472ed294f0be4538626d4af2e95780ed786128e78
          • Instruction Fuzzy Hash: 8E2125B1504240EFDF09DF94E9C0B66BBA5FB84314F20C569E8190BA46C336E456CBA2
          Memory Dump Source
          • Source File: 00000007.00000002.1425252173.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_11ad000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 375d6e0ee622db8a2d82961cab3b1e756c4cb54ad7198657c2b0ba99d2c9b153
          • Instruction ID: 75618ee661cf1b65aa5f534b17426fab8fc6dc151b4952ac45b0db70bc8055be
          • Opcode Fuzzy Hash: 375d6e0ee622db8a2d82961cab3b1e756c4cb54ad7198657c2b0ba99d2c9b153
          • Instruction Fuzzy Hash: BB210379544700DFDF19DF64EA80B26BFA1FB84214F60C569E8494B642C336D447CA62
          Memory Dump Source
          • Source File: 00000007.00000002.1425252173.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_11ad000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 72079275ea4e920e59b496b022c8d4e5ca3a9334f6b43ad232ba3117060d16b9
          • Instruction ID: 717458228561d22dbf03d3fccbaad7e9f1c0acfaf8443f0cbed63a89e8cde27d
          • Opcode Fuzzy Hash: 72079275ea4e920e59b496b022c8d4e5ca3a9334f6b43ad232ba3117060d16b9
          • Instruction Fuzzy Hash: 42210779504700EFDF09DF94E5C0B25BFA5FB84324F60C56EE8494B652C336D446CA62
          Memory Dump Source
          • Source File: 00000007.00000002.1425252173.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_11ad000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 43fe44aae5d137345e46aee5eb9e5b7df478b3c737ecd8f6289c0dc35a9befc9
          • Instruction ID: 26e00d4e4bafcc571a318429b612dfc3120c1c9f2f1d670d4ce39aae7600117e
          • Opcode Fuzzy Hash: 43fe44aae5d137345e46aee5eb9e5b7df478b3c737ecd8f6289c0dc35a9befc9
          • Instruction Fuzzy Hash: 9A21C2754487809FCB07CF24D994711BF71EF46214F28C5DAD8498F6A7C33A980ACB62
          Memory Dump Source
          • Source File: 00000007.00000002.1425185301.000000000119D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0119D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_119d000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
          • Instruction ID: 419ab9982b88f3a866737b9291777b42cd2dbfcfe97961e8e991419c44399f9e
          • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
          • Instruction Fuzzy Hash: 0D11AF76504280CFCF16CF54D5C4B56BF71FB84314F24C5A9D8490BA56C336E45ACBA2
          Memory Dump Source
          • Source File: 00000007.00000002.1425252173.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_11ad000_ZcgffemBWp.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fb11cfc8073ccb158cd0f42583cdb3ded50e3effa001a3c93aefd0de24dc37f6
          • Instruction ID: 43cf9e00d3cfe4115f3a6f61023defe239c3f42f3ccb73c28fe6363f9bc028e3
          • Opcode Fuzzy Hash: fb11cfc8073ccb158cd0f42583cdb3ded50e3effa001a3c93aefd0de24dc37f6
          • Instruction Fuzzy Hash: 8011BE79504640DFCB06CF54D5C4B15BFA1FB84224F24C6AAD8494BA66C33AD44ACB52