Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
Analysis ID:1543577
MD5:32bbe58d2336cd18c22d221a3836bd50
SHA1:7b559b7160fa1f0de211afd3dcb81a41a2a7fd89
SHA256:066e985867d56271776ab61510202ffdd1bec246fc15dd38dd17a38223d50d40
Tags:AveMariaRATexe
Infos:

Detection

AveMaria, UACMe
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected AveMaria stealer
Yara detected UACMe UAC Bypass tool
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe (PID: 6896 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe" MD5: 32BBE58D2336CD18C22D221A3836BD50)
    • powershell.exe (PID: 4280 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4956 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7280 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 3192 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vbc.exe (PID: 1216 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 4948 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 6316 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 6300 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 7092 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
  • rRQnnfB.exe (PID: 7220 cmdline: C:\Users\user\AppData\Roaming\rRQnnfB.exe MD5: 32BBE58D2336CD18C22D221A3836BD50)
    • schtasks.exe (PID: 7424 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vbc.exe (PID: 7468 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 7476 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 7484 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 7492 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 7500 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Ave Maria, AveMariaRAT, avemariaInformation stealer which uses AutoIT for wrapping.
  • Anunak
https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria
NameDescriptionAttributionBlogpost URLsLink
UACMeA toolkit maintained by hfiref0x which incorporates numerous UAC bypass techniques for Windows 7 - Windows 10. Typically, components of this tool are stripped out and reused by malicious actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.uacme
{"C2 url": "wznne1.duckdns.org", "port": 63196, "Proxy Port": 0}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
    00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
        00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AveMaria_31d2bce9unknownunknown
        • 0x27efe8:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
        • 0x2a0008:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
        • 0x27d7cc:$a2: SMTP Password
        • 0x29e7ec:$a2: SMTP Password
        • 0x27c880:$a3: select signon_realm, origin_url, username_value, password_value from logins
        • 0x29d8a0:$a3: select signon_realm, origin_url, username_value, password_value from logins
        • 0x281d58:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        • 0x2a2d78:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        • 0x27ef38:$a5: for /F "usebackq tokens=*" %%A in ("
        • 0x29ff58:$a5: for /F "usebackq tokens=*" %%A in ("
        • 0x27d258:$a6: \Torch\User Data\Default\Login Data
        • 0x29e278:$a6: \Torch\User Data\Default\Login Data
        • 0x281e78:$a7: /n:%temp%\ellocnak.xml
        • 0x2a2e98:$a7: /n:%temp%\ellocnak.xml
        • 0x27ddb8:$a8: "os_crypt":{"encrypted_key":"
        • 0x29edd8:$a8: "os_crypt":{"encrypted_key":"
        • 0x281ea8:$a9: Hey I'm Admin
        • 0x2a2ec8:$a9: Hey I'm Admin
        • 0x27d694:$a10: \logins.json
        • 0x29e6b4:$a10: \logins.json
        • 0x27dd30:$a11: Accounts\Account.rec0
        0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
          Click to see the 9 entries
          SourceRuleDescriptionAuthorStrings
          13.2.rRQnnfB.exe.4332420.0.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
            13.2.rRQnnfB.exe.4332420.0.unpackJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
              13.2.rRQnnfB.exe.4332420.0.unpackWindows_Trojan_AveMaria_31d2bce9unknownunknown
              • 0x19280:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
              • 0x17a64:$a2: SMTP Password
              • 0x1bff0:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
              • 0x191d0:$a5: for /F "usebackq tokens=*" %%A in ("
              • 0x1c110:$a7: /n:%temp%\ellocnak.xml
              • 0x18050:$a8: "os_crypt":{"encrypted_key":"
              • 0x1c140:$a9: Hey I'm Admin
              • 0x1792c:$a10: \logins.json
              • 0x17fc8:$a11: Accounts\Account.rec0
              • 0x18f58:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
              13.2.rRQnnfB.exe.4332420.0.unpackAveMaria_WarZoneunknownunknown
              • 0x19280:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
              • 0x19084:$str2: MsgBox.exe
              • 0x192ec:$str4: \System32\cmd.exe
              • 0x18f58:$str6: Ave_Maria
              • 0x187b8:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              • 0x17a64:$str8: SMTP Password
              • 0x18784:$str12: \sqlmap.dll
              • 0x1bff0:$str16: Elevation:Administrator!new
              • 0x1c110:$str17: /n:%temp%
              13.2.rRQnnfB.exe.4332420.0.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
              • 0x1bff0:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
              Click to see the 48 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ParentProcessId: 6896, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ProcessId: 4280, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ParentProcessId: 6896, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ProcessId: 4280, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\rRQnnfB.exe, ParentImage: C:\Users\user\AppData\Roaming\rRQnnfB.exe, ParentProcessId: 7220, ParentProcessName: rRQnnfB.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp", ProcessId: 7424, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ParentProcessId: 6896, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp", ProcessId: 3192, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ParentProcessId: 6896, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ProcessId: 4280, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ParentProcessId: 6896, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp", ProcessId: 3192, ProcessName: schtasks.exe
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpackMalware Configuration Extractor: AveMaria {"C2 url": "wznne1.duckdns.org", "port": 63196, "Proxy Port": 0}
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeReversingLabs: Detection: 31%
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeVirustotal: Detection: 39%Perma Link
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeReversingLabs: Detection: 31%
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeVirustotal: Detection: 39%Perma Link
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeJoe Sandbox ML: detected
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeJoe Sandbox ML: detected

              Exploits

              barindex
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rRQnnfB.exe PID: 7220, type: MEMORYSTR
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: fFdw.pdb source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, rRQnnfB.exe.0.dr
              Source: Binary string: fFdw.pdbSHA256TFB source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, rRQnnfB.exe.0.dr

              Networking

              barindex
              Source: Malware configuration extractorURLs: wznne1.duckdns.org
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1869611688.000000000279F000.00000004.00000800.00020000.00000000.sdmp, rRQnnfB.exe, 0000000D.00000002.1918659052.0000000002A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883579784.0000000005070000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, rRQnnfB.exe, 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_886a90b9-2

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
              Source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08706780 NtQueryInformationProcess,0_2_08706780
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08706CA0 NtQueryInformationProcess,0_2_08706CA0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB6780 NtQueryInformationProcess,13_2_06CB6780
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB6C58 NtQueryInformationProcess,13_2_06CB6C58
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_0088EF040_2_0088EF04
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_06F573B80_2_06F573B8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_06F51EA80_2_06F51EA8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_06F51E980_2_06F51E98
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_06F515D00_2_06F515D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_06F511980_2_06F51198
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087028D00_2_087028D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087068A40_2_087068A4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08703BA00_2_08703BA0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08708C200_2_08708C20
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087000400_2_08700040
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_0870F4FA0_2_0870F4FA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087058700_2_08705870
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087028C00_2_087028C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087058800_2_08705880
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_0870F9800_2_0870F980
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08703B900_2_08703B90
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08708C100_2_08708C10
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08705CB80_2_08705CB8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08706E280_2_08706E28
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08708EB00_2_08708EB0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_08708EA00_2_08708EA0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeCode function: 0_2_087061780_2_08706178
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_0281EF0413_2_0281EF04
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_0298656813_2_02986568
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_0298119813_2_02981198
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_02981EA813_2_02981EA8
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_02981EA313_2_02981EA3
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_029815D013_2_029815D0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_04FA776813_2_04FA7768
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_04FA004013_2_04FA0040
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_04FA001C13_2_04FA001C
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_04FA774013_2_04FA7740
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB004013_2_06CB0040
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB8C2013_2_06CB8C20
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB3BA013_2_06CB3BA0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB28D013_2_06CB28D0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB68A413_2_06CB68A4
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBF5A713_2_06CBF5A7
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB617813_2_06CB6178
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB8EA013_2_06CB8EA0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB8EB013_2_06CB8EB0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB6E2813_2_06CB6E28
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB5CB813_2_06CB5CB8
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB8C1013_2_06CB8C10
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB3B9013_2_06CB3B90
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB28C013_2_06CB28C0
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB588013_2_06CB5880
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB289813_2_06CB2898
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CB587013_2_06CB5870
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBF9E013_2_06CBF9E0
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1868545597.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1884778433.0000000006EB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000000.1821904359.0000000000266000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamefFdw.exe( vs SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeBinary or memory string: OriginalFilenamefFdw.exe( vs SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
              Source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: rRQnnfB.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CVeAIRqKVAUjENZeFc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CVeAIRqKVAUjENZeFc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CX3iJ4B259LhE6n5YZ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CVeAIRqKVAUjENZeFc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@35/15@0/0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeFile created: C:\Users\user\AppData\Roaming\rRQnnfB.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMutant created: \Sessions\1\BaseNamedObjects\BZvfDvpVAjvktJhjnBq
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7432:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3156:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2044:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1612:120:WilError_03
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE51C.tmpJump to behavior
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeReversingLabs: Detection: 31%
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeVirustotal: Detection: 39%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\rRQnnfB.exe C:\Users\user\AppData\Roaming\rRQnnfB.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: fFdw.pdb source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, rRQnnfB.exe.0.dr
              Source: Binary string: fFdw.pdbSHA256TFB source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, rRQnnfB.exe.0.dr

              Data Obfuscation

              barindex
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CX3iJ4B259LhE6n5YZ.cs.Net Code: WFnrnxulDq System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.86d0000.5.raw.unpack, Uo.cs.Net Code: _202A_202E_206E_206A_202B_206A_200E_200D_206F_200D_200C_200B_206E_202C_202B_200E_206A_202D_202A_202C_202E_206B_202C_202E_202D_206F_206C_200E_202D_206B_202D_206D_202A_200C_200C_200B_200C_202B_200D_202E_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CX3iJ4B259LhE6n5YZ.cs.Net Code: WFnrnxulDq System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.35c0b90.2.raw.unpack, Uo.cs.Net Code: _202A_202E_206E_206A_202B_206A_200E_200D_206F_200D_200C_200B_206E_202C_202B_200E_206A_202D_202A_202C_202E_206B_202C_202E_202D_206F_206C_200E_202D_206B_202D_206D_202A_200C_200C_200B_200C_202B_200D_202E_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CX3iJ4B259LhE6n5YZ.cs.Net Code: WFnrnxulDq System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_02984982 pushad ; retf 13_2_02984983
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_029857A1 pushfd ; retf 0006h13_2_029857A2
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_02985760 pushfd ; retf 0006h13_2_02985762
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_04FA5A52 push edx; ret 13_2_04FA5A58
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_04FA5A32 push edx; ret 13_2_04FA5A33
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE649 push esi; retf 0006h13_2_06CBE64A
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE7A9 push edi; retf 0006h13_2_06CBE7AA
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE7B1 push edi; retf 0006h13_2_06CBE7B2
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE468 push ebp; retf 0006h13_2_06CBE46A
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE5C0 push esi; retf 0006h13_2_06CBE5C2
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE049 push edx; retf 0006h13_2_06CBE04A
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE071 push edx; retf 0006h13_2_06CBE072
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE1B1 push ebx; retf 0006h13_2_06CBE1B2
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE178 push ebx; retf 0006h13_2_06CBE17A
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE101 push ebx; retf 0006h13_2_06CBE102
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBDED9 push ecx; retf 0006h13_2_06CBDEDA
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBDE68 push ecx; retf 0006h13_2_06CBDE6A
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBDFB8 push edx; retf 0006h13_2_06CBDFBA
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBDF4F push ecx; retf 0006h13_2_06CBDF52
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBDCB9 push eax; retf 0006h13_2_06CBDCBA
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBED90 pushad ; retf 0006h13_2_06CBED92
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeCode function: 13_2_06CBE84F push edi; retf 0006h13_2_06CBE852
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeStatic PE information: section name: .text entropy: 7.890111172644623
              Source: rRQnnfB.exe.0.drStatic PE information: section name: .text entropy: 7.890111172644623
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, wRS7JdEQI6RiJa9NhS.csHigh entropy of concatenated method names: 'qGsqacsCfa', 'AonqycRv3C', 'tVXFxbJhgY', 'lAxFQtROi7', 'tbEFfCUhV9', 'M7rFY0hTdP', 'omUFCwpve7', 'DwvFE4vfDq', 'oHMFmPIHgL', 'N9DFhPow6L'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, tt6vKJoVZYcrI4oodB.csHigh entropy of concatenated method names: 'fnW9jDgwWr', 'Rol9XXhdMy', 'gxD9rxRkin', 'iZq9Zu9I6u', 'Rtj9dCSlyu', 'wqs9q8KF0i', 'Xw491VDD5J', 'sbxD3JhUA6', 'LwSDoRe3b7', 'CBuDKoHiNJ'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, SlJvIeZNIyCwQr5pjh.csHigh entropy of concatenated method names: 'OCxnxMceH', 'tCeMKGdXv', 'r6JGxNOn2', 'dvyyPW5nS', 'VrE7kfmqc', 'rT1wFSFpg', 'ldoOGCJpscCShvlEiB', 'q2Y7oZ6yyIVnHsEqIV', 'a3dDvv0XA', 'HV7lKJ14W'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, cAadsMdP0P3JYQkDOD.csHigh entropy of concatenated method names: 'xgM1BHOu5j', 'zQP1dvZiNj', 'DwS1qRunYR', 'dj11TYf3Jn', 'ReN12uAVD5', 'pfBqWa94ga', 'b48qt3xVMX', 'KZ9q3Iu0SC', 'sCWqoZrA7H', 'cgaqK6rSPI'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, TQtneES6krZtUT94TX.csHigh entropy of concatenated method names: 'ToString', 'VRosH0FTyp', 'rg1sSZxsr4', 'fEjsxUR4mW', 'wpxsQL631s', 'ALtsfMBk8M', 'MyxsYvEObE', 'QQjsCnSfnh', 'Q7isE48Hn4', 'Af9smVBvFS'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, s6ncy1Lw04bCpVC7if.csHigh entropy of concatenated method names: 'Dispose', 'oNSjKA5elf', 'XlovS6YUkF', 'itW55sLOdM', 'h4Lj8cBljy', 'DuGjz5GgxS', 'ProcessDialogKey', 'kWovcuBdgh', 'rr5vjisbjM', 'iUfvvKAGYK'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, oaa30fNJAoUh5TUfeuk.csHigh entropy of concatenated method names: 'Pf996KyViH', 'yfd9ikf16g', 'DhX9nWTCM5', 'YJ79M5Emnb', 'Tmm9anHg0w', 'yUT9GRO5aQ', 'W8j9y5GXK2', 'SxX9N8jNAQ', 'Re397XTGyK', 'KJE9wvEL2t'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, NXXgJGNZk0xKRQAS8QG.csHigh entropy of concatenated method names: 'Sofl6qPXE1', 'TgpliIg4B1', 'TBKlnJU3AU', 'eRbItx8zgOZywHM7d3r', 'bNWcyMMbpQGVakAUR7y', 'S4ijp9M4EsdKDAKQDiN'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, Fvn8m7tuOPdvJ4jDnZ.csHigh entropy of concatenated method names: 'wEHT6iyD3M', 'pViTiPZRa5', 'CuwTn6KKZt', 'wRxTMmyUxk', 'bHaTannbOK', 'HU3TGnWPLV', 'eucTyxqB8X', 'KcsTNBIkgP', 'En0T7yuVRN', 'qLqTwNTaIU'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, yR88jQMAKhKEMBS7Qu.csHigh entropy of concatenated method names: 'IHqRhH8bkF', 'oScRkjoqAO', 'WQNRpEeLxX', 'ltXRJMYboi', 'A8aRSWomNG', 'vJhRx61oo5', 'InIRQEV7JH', 'hxwRfTLoOh', 'o1kRYZT8kJ', 'ljHRCdKuv3'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, oeey8gH5TTgCq9FdMc.csHigh entropy of concatenated method names: 'C6HjTs83ZJ', 'U4Ej22xPyc', 'VinjPejMWV', 'E8uj4Sb2b2', 'IigjRX8Py7', 'ckRjs4pxBQ', 'PEJqXgPviLpQLeEbQb', 'WXJfRneRkWoWEb4vHN', 'nmBjjGLQpQ', 'myNjXDPJ0s'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, v665J5NNjabfWwhwPp6.csHigh entropy of concatenated method names: 'ToString', 'XWAlXwMrYG', 'jTYlrqhljG', 'wTVlBbIV75', 'x0rlZAuktm', 'skWld6Bnei', 'UkVlFIKdkL', 'sPflqjqo31', 'BBknmk8ApeuCE73tXjN', 'M0VEtA8nZPTChFjRxBO'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CX3iJ4B259LhE6n5YZ.csHigh entropy of concatenated method names: 'tvyXBYGpP8', 'gWBXZ3CUsX', 'hLpXdMQLgv', 'Is4XFUFeHs', 'HHWXqKUsZd', 'S4pX1cWpyF', 'prmXT0rHoK', 'hjGX2yUBhh', 'JbDXVZmfgm', 'obpXP0ChjW'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, NP4J8S8hP8gr8Qji8u.csHigh entropy of concatenated method names: 'hZiDgeCHsX', 'DFjDSYPckD', 'BTnDxHobBk', 'haVDQqX7uI', 'QHIDpiu4en', 'egDDfYQMBC', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, ByvjEchBSQcyD9Vy3C.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Gl2vKdo5R9', 'FIFv8lcAXO', 'DxtvzKsQsy', 'jJNXcbF2Rs', 'uRDXjD7EE7', 'RWfXv3tmk1', 'zkPXXUb9mB', 'ukP3BB4M0QQHdO9uZxw'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, i0aMmgNuZExrOY05mT6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mWslpFU3hs', 'DfnlJRGkRa', 'Lcklue5d8o', 'cjVlbcyZka', 'UaGlW9XlcY', 'yUkltOomeR', 'k5el3ISGuE'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, b1ylFLKTXKNi2gtlJZ.csHigh entropy of concatenated method names: 'M9wTZ3mjFH', 'G37TFRk3Ew', 'xV5T1mkme2', 'lbc18KuF7i', 'WNa1zdimet', 'jhDTcTr4lZ', 'LINTjxt5qg', 'djFTv32CZk', 'mJsTX1UX2C', 'CkKTrbbKe6'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, cA9TsJkCtNpsbMUBWc.csHigh entropy of concatenated method names: 'gDeFMxHDg7', 'tZNFGFYYuG', 'pQfFNQLOOP', 'dpmF7M5Io2', 'zTSFRtAR1E', 'pARFs8gcCZ', 'fOKFUahZfY', 'lphFDGNDv8', 'GnYF9MBVK2', 'uPnFlKeLrm'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, CVeAIRqKVAUjENZeFc.csHigh entropy of concatenated method names: 'YJRdpxy1NO', 'USrdJsEI7v', 'tCVdu794ZX', 'dnHdbPcqSV', 'CmvdWgnUIR', 'W5SdtbkBVk', 'IRYd3nb0I8', 'zHUdoo2DEd', 'yqgdKc1kvM', 'mcWd8VrqyV'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, Jo4VD4njEJmiQrM7K2.csHigh entropy of concatenated method names: 'qRvkmtogWGstKeCOtcF', 'qVZlTAoLLquOPKwisnu', 'U8h1D25St5', 'i7m19Kryb4', 'Rn11lLF1in', 'c8s0pAoD4UJMfqDuFId', 'Elhuv2oxYbLd2IMTHeR'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, mj9pkKDWJbxAigqQ8p.csHigh entropy of concatenated method names: 'qrEDZY2yGp', 'ziaDdVdsK0', 'aReDFfdEqL', 'A7uDqG3cMG', 'Q4dD1SGVPj', 'WfQDTLrjvq', 'cLbD2RiHX1', 'qu3DV2UtU9', 'YZ4DPobOqM', 'woQD4R8BD3'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, RZUQGYQDOgsRHRAqv4.csHigh entropy of concatenated method names: 'u0vUoIiad5', 'JrbU8sfZEj', 've0Dc5jGF6', 'PwxDjOKoAO', 'Nv4UHwrak6', 'aVFUk1voNA', 'KcTUL7Y7VZ', 'j7TUpBD9T8', 'iyPUJwKohc', 'VfTUuB6RW5'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, Gi4mvvUS94GkjKbif0.csHigh entropy of concatenated method names: 'jLFANL9Bcu', 'b0eA7lDbfw', 'SilAgddMd5', 'I2HASp1hBL', 'uBAAQexT4I', 'NBlAfKaRUx', 'BrLAC4xqLg', 'dQyAEgVnmD', 'TkOAhKv7IA', 'UHEAHLKm0D'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, wRS7JdEQI6RiJa9NhS.csHigh entropy of concatenated method names: 'qGsqacsCfa', 'AonqycRv3C', 'tVXFxbJhgY', 'lAxFQtROi7', 'tbEFfCUhV9', 'M7rFY0hTdP', 'omUFCwpve7', 'DwvFE4vfDq', 'oHMFmPIHgL', 'N9DFhPow6L'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, tt6vKJoVZYcrI4oodB.csHigh entropy of concatenated method names: 'fnW9jDgwWr', 'Rol9XXhdMy', 'gxD9rxRkin', 'iZq9Zu9I6u', 'Rtj9dCSlyu', 'wqs9q8KF0i', 'Xw491VDD5J', 'sbxD3JhUA6', 'LwSDoRe3b7', 'CBuDKoHiNJ'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, SlJvIeZNIyCwQr5pjh.csHigh entropy of concatenated method names: 'OCxnxMceH', 'tCeMKGdXv', 'r6JGxNOn2', 'dvyyPW5nS', 'VrE7kfmqc', 'rT1wFSFpg', 'ldoOGCJpscCShvlEiB', 'q2Y7oZ6yyIVnHsEqIV', 'a3dDvv0XA', 'HV7lKJ14W'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, cAadsMdP0P3JYQkDOD.csHigh entropy of concatenated method names: 'xgM1BHOu5j', 'zQP1dvZiNj', 'DwS1qRunYR', 'dj11TYf3Jn', 'ReN12uAVD5', 'pfBqWa94ga', 'b48qt3xVMX', 'KZ9q3Iu0SC', 'sCWqoZrA7H', 'cgaqK6rSPI'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, TQtneES6krZtUT94TX.csHigh entropy of concatenated method names: 'ToString', 'VRosH0FTyp', 'rg1sSZxsr4', 'fEjsxUR4mW', 'wpxsQL631s', 'ALtsfMBk8M', 'MyxsYvEObE', 'QQjsCnSfnh', 'Q7isE48Hn4', 'Af9smVBvFS'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, s6ncy1Lw04bCpVC7if.csHigh entropy of concatenated method names: 'Dispose', 'oNSjKA5elf', 'XlovS6YUkF', 'itW55sLOdM', 'h4Lj8cBljy', 'DuGjz5GgxS', 'ProcessDialogKey', 'kWovcuBdgh', 'rr5vjisbjM', 'iUfvvKAGYK'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, oaa30fNJAoUh5TUfeuk.csHigh entropy of concatenated method names: 'Pf996KyViH', 'yfd9ikf16g', 'DhX9nWTCM5', 'YJ79M5Emnb', 'Tmm9anHg0w', 'yUT9GRO5aQ', 'W8j9y5GXK2', 'SxX9N8jNAQ', 'Re397XTGyK', 'KJE9wvEL2t'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, NXXgJGNZk0xKRQAS8QG.csHigh entropy of concatenated method names: 'Sofl6qPXE1', 'TgpliIg4B1', 'TBKlnJU3AU', 'eRbItx8zgOZywHM7d3r', 'bNWcyMMbpQGVakAUR7y', 'S4ijp9M4EsdKDAKQDiN'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, Fvn8m7tuOPdvJ4jDnZ.csHigh entropy of concatenated method names: 'wEHT6iyD3M', 'pViTiPZRa5', 'CuwTn6KKZt', 'wRxTMmyUxk', 'bHaTannbOK', 'HU3TGnWPLV', 'eucTyxqB8X', 'KcsTNBIkgP', 'En0T7yuVRN', 'qLqTwNTaIU'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, yR88jQMAKhKEMBS7Qu.csHigh entropy of concatenated method names: 'IHqRhH8bkF', 'oScRkjoqAO', 'WQNRpEeLxX', 'ltXRJMYboi', 'A8aRSWomNG', 'vJhRx61oo5', 'InIRQEV7JH', 'hxwRfTLoOh', 'o1kRYZT8kJ', 'ljHRCdKuv3'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, oeey8gH5TTgCq9FdMc.csHigh entropy of concatenated method names: 'C6HjTs83ZJ', 'U4Ej22xPyc', 'VinjPejMWV', 'E8uj4Sb2b2', 'IigjRX8Py7', 'ckRjs4pxBQ', 'PEJqXgPviLpQLeEbQb', 'WXJfRneRkWoWEb4vHN', 'nmBjjGLQpQ', 'myNjXDPJ0s'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, v665J5NNjabfWwhwPp6.csHigh entropy of concatenated method names: 'ToString', 'XWAlXwMrYG', 'jTYlrqhljG', 'wTVlBbIV75', 'x0rlZAuktm', 'skWld6Bnei', 'UkVlFIKdkL', 'sPflqjqo31', 'BBknmk8ApeuCE73tXjN', 'M0VEtA8nZPTChFjRxBO'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CX3iJ4B259LhE6n5YZ.csHigh entropy of concatenated method names: 'tvyXBYGpP8', 'gWBXZ3CUsX', 'hLpXdMQLgv', 'Is4XFUFeHs', 'HHWXqKUsZd', 'S4pX1cWpyF', 'prmXT0rHoK', 'hjGX2yUBhh', 'JbDXVZmfgm', 'obpXP0ChjW'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, NP4J8S8hP8gr8Qji8u.csHigh entropy of concatenated method names: 'hZiDgeCHsX', 'DFjDSYPckD', 'BTnDxHobBk', 'haVDQqX7uI', 'QHIDpiu4en', 'egDDfYQMBC', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, ByvjEchBSQcyD9Vy3C.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Gl2vKdo5R9', 'FIFv8lcAXO', 'DxtvzKsQsy', 'jJNXcbF2Rs', 'uRDXjD7EE7', 'RWfXv3tmk1', 'zkPXXUb9mB', 'ukP3BB4M0QQHdO9uZxw'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, i0aMmgNuZExrOY05mT6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mWslpFU3hs', 'DfnlJRGkRa', 'Lcklue5d8o', 'cjVlbcyZka', 'UaGlW9XlcY', 'yUkltOomeR', 'k5el3ISGuE'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, b1ylFLKTXKNi2gtlJZ.csHigh entropy of concatenated method names: 'M9wTZ3mjFH', 'G37TFRk3Ew', 'xV5T1mkme2', 'lbc18KuF7i', 'WNa1zdimet', 'jhDTcTr4lZ', 'LINTjxt5qg', 'djFTv32CZk', 'mJsTX1UX2C', 'CkKTrbbKe6'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, cA9TsJkCtNpsbMUBWc.csHigh entropy of concatenated method names: 'gDeFMxHDg7', 'tZNFGFYYuG', 'pQfFNQLOOP', 'dpmF7M5Io2', 'zTSFRtAR1E', 'pARFs8gcCZ', 'fOKFUahZfY', 'lphFDGNDv8', 'GnYF9MBVK2', 'uPnFlKeLrm'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, CVeAIRqKVAUjENZeFc.csHigh entropy of concatenated method names: 'YJRdpxy1NO', 'USrdJsEI7v', 'tCVdu794ZX', 'dnHdbPcqSV', 'CmvdWgnUIR', 'W5SdtbkBVk', 'IRYd3nb0I8', 'zHUdoo2DEd', 'yqgdKc1kvM', 'mcWd8VrqyV'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, Jo4VD4njEJmiQrM7K2.csHigh entropy of concatenated method names: 'qRvkmtogWGstKeCOtcF', 'qVZlTAoLLquOPKwisnu', 'U8h1D25St5', 'i7m19Kryb4', 'Rn11lLF1in', 'c8s0pAoD4UJMfqDuFId', 'Elhuv2oxYbLd2IMTHeR'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, mj9pkKDWJbxAigqQ8p.csHigh entropy of concatenated method names: 'qrEDZY2yGp', 'ziaDdVdsK0', 'aReDFfdEqL', 'A7uDqG3cMG', 'Q4dD1SGVPj', 'WfQDTLrjvq', 'cLbD2RiHX1', 'qu3DV2UtU9', 'YZ4DPobOqM', 'woQD4R8BD3'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, RZUQGYQDOgsRHRAqv4.csHigh entropy of concatenated method names: 'u0vUoIiad5', 'JrbU8sfZEj', 've0Dc5jGF6', 'PwxDjOKoAO', 'Nv4UHwrak6', 'aVFUk1voNA', 'KcTUL7Y7VZ', 'j7TUpBD9T8', 'iyPUJwKohc', 'VfTUuB6RW5'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.6eb0000.4.raw.unpack, Gi4mvvUS94GkjKbif0.csHigh entropy of concatenated method names: 'jLFANL9Bcu', 'b0eA7lDbfw', 'SilAgddMd5', 'I2HASp1hBL', 'uBAAQexT4I', 'NBlAfKaRUx', 'BrLAC4xqLg', 'dQyAEgVnmD', 'TkOAhKv7IA', 'UHEAHLKm0D'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, wRS7JdEQI6RiJa9NhS.csHigh entropy of concatenated method names: 'qGsqacsCfa', 'AonqycRv3C', 'tVXFxbJhgY', 'lAxFQtROi7', 'tbEFfCUhV9', 'M7rFY0hTdP', 'omUFCwpve7', 'DwvFE4vfDq', 'oHMFmPIHgL', 'N9DFhPow6L'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, tt6vKJoVZYcrI4oodB.csHigh entropy of concatenated method names: 'fnW9jDgwWr', 'Rol9XXhdMy', 'gxD9rxRkin', 'iZq9Zu9I6u', 'Rtj9dCSlyu', 'wqs9q8KF0i', 'Xw491VDD5J', 'sbxD3JhUA6', 'LwSDoRe3b7', 'CBuDKoHiNJ'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, SlJvIeZNIyCwQr5pjh.csHigh entropy of concatenated method names: 'OCxnxMceH', 'tCeMKGdXv', 'r6JGxNOn2', 'dvyyPW5nS', 'VrE7kfmqc', 'rT1wFSFpg', 'ldoOGCJpscCShvlEiB', 'q2Y7oZ6yyIVnHsEqIV', 'a3dDvv0XA', 'HV7lKJ14W'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, cAadsMdP0P3JYQkDOD.csHigh entropy of concatenated method names: 'xgM1BHOu5j', 'zQP1dvZiNj', 'DwS1qRunYR', 'dj11TYf3Jn', 'ReN12uAVD5', 'pfBqWa94ga', 'b48qt3xVMX', 'KZ9q3Iu0SC', 'sCWqoZrA7H', 'cgaqK6rSPI'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, TQtneES6krZtUT94TX.csHigh entropy of concatenated method names: 'ToString', 'VRosH0FTyp', 'rg1sSZxsr4', 'fEjsxUR4mW', 'wpxsQL631s', 'ALtsfMBk8M', 'MyxsYvEObE', 'QQjsCnSfnh', 'Q7isE48Hn4', 'Af9smVBvFS'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, s6ncy1Lw04bCpVC7if.csHigh entropy of concatenated method names: 'Dispose', 'oNSjKA5elf', 'XlovS6YUkF', 'itW55sLOdM', 'h4Lj8cBljy', 'DuGjz5GgxS', 'ProcessDialogKey', 'kWovcuBdgh', 'rr5vjisbjM', 'iUfvvKAGYK'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, oaa30fNJAoUh5TUfeuk.csHigh entropy of concatenated method names: 'Pf996KyViH', 'yfd9ikf16g', 'DhX9nWTCM5', 'YJ79M5Emnb', 'Tmm9anHg0w', 'yUT9GRO5aQ', 'W8j9y5GXK2', 'SxX9N8jNAQ', 'Re397XTGyK', 'KJE9wvEL2t'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, NXXgJGNZk0xKRQAS8QG.csHigh entropy of concatenated method names: 'Sofl6qPXE1', 'TgpliIg4B1', 'TBKlnJU3AU', 'eRbItx8zgOZywHM7d3r', 'bNWcyMMbpQGVakAUR7y', 'S4ijp9M4EsdKDAKQDiN'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, Fvn8m7tuOPdvJ4jDnZ.csHigh entropy of concatenated method names: 'wEHT6iyD3M', 'pViTiPZRa5', 'CuwTn6KKZt', 'wRxTMmyUxk', 'bHaTannbOK', 'HU3TGnWPLV', 'eucTyxqB8X', 'KcsTNBIkgP', 'En0T7yuVRN', 'qLqTwNTaIU'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, yR88jQMAKhKEMBS7Qu.csHigh entropy of concatenated method names: 'IHqRhH8bkF', 'oScRkjoqAO', 'WQNRpEeLxX', 'ltXRJMYboi', 'A8aRSWomNG', 'vJhRx61oo5', 'InIRQEV7JH', 'hxwRfTLoOh', 'o1kRYZT8kJ', 'ljHRCdKuv3'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, oeey8gH5TTgCq9FdMc.csHigh entropy of concatenated method names: 'C6HjTs83ZJ', 'U4Ej22xPyc', 'VinjPejMWV', 'E8uj4Sb2b2', 'IigjRX8Py7', 'ckRjs4pxBQ', 'PEJqXgPviLpQLeEbQb', 'WXJfRneRkWoWEb4vHN', 'nmBjjGLQpQ', 'myNjXDPJ0s'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, v665J5NNjabfWwhwPp6.csHigh entropy of concatenated method names: 'ToString', 'XWAlXwMrYG', 'jTYlrqhljG', 'wTVlBbIV75', 'x0rlZAuktm', 'skWld6Bnei', 'UkVlFIKdkL', 'sPflqjqo31', 'BBknmk8ApeuCE73tXjN', 'M0VEtA8nZPTChFjRxBO'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CX3iJ4B259LhE6n5YZ.csHigh entropy of concatenated method names: 'tvyXBYGpP8', 'gWBXZ3CUsX', 'hLpXdMQLgv', 'Is4XFUFeHs', 'HHWXqKUsZd', 'S4pX1cWpyF', 'prmXT0rHoK', 'hjGX2yUBhh', 'JbDXVZmfgm', 'obpXP0ChjW'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, NP4J8S8hP8gr8Qji8u.csHigh entropy of concatenated method names: 'hZiDgeCHsX', 'DFjDSYPckD', 'BTnDxHobBk', 'haVDQqX7uI', 'QHIDpiu4en', 'egDDfYQMBC', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, ByvjEchBSQcyD9Vy3C.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Gl2vKdo5R9', 'FIFv8lcAXO', 'DxtvzKsQsy', 'jJNXcbF2Rs', 'uRDXjD7EE7', 'RWfXv3tmk1', 'zkPXXUb9mB', 'ukP3BB4M0QQHdO9uZxw'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, i0aMmgNuZExrOY05mT6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mWslpFU3hs', 'DfnlJRGkRa', 'Lcklue5d8o', 'cjVlbcyZka', 'UaGlW9XlcY', 'yUkltOomeR', 'k5el3ISGuE'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, b1ylFLKTXKNi2gtlJZ.csHigh entropy of concatenated method names: 'M9wTZ3mjFH', 'G37TFRk3Ew', 'xV5T1mkme2', 'lbc18KuF7i', 'WNa1zdimet', 'jhDTcTr4lZ', 'LINTjxt5qg', 'djFTv32CZk', 'mJsTX1UX2C', 'CkKTrbbKe6'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, cA9TsJkCtNpsbMUBWc.csHigh entropy of concatenated method names: 'gDeFMxHDg7', 'tZNFGFYYuG', 'pQfFNQLOOP', 'dpmF7M5Io2', 'zTSFRtAR1E', 'pARFs8gcCZ', 'fOKFUahZfY', 'lphFDGNDv8', 'GnYF9MBVK2', 'uPnFlKeLrm'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, CVeAIRqKVAUjENZeFc.csHigh entropy of concatenated method names: 'YJRdpxy1NO', 'USrdJsEI7v', 'tCVdu794ZX', 'dnHdbPcqSV', 'CmvdWgnUIR', 'W5SdtbkBVk', 'IRYd3nb0I8', 'zHUdoo2DEd', 'yqgdKc1kvM', 'mcWd8VrqyV'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, Jo4VD4njEJmiQrM7K2.csHigh entropy of concatenated method names: 'qRvkmtogWGstKeCOtcF', 'qVZlTAoLLquOPKwisnu', 'U8h1D25St5', 'i7m19Kryb4', 'Rn11lLF1in', 'c8s0pAoD4UJMfqDuFId', 'Elhuv2oxYbLd2IMTHeR'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, mj9pkKDWJbxAigqQ8p.csHigh entropy of concatenated method names: 'qrEDZY2yGp', 'ziaDdVdsK0', 'aReDFfdEqL', 'A7uDqG3cMG', 'Q4dD1SGVPj', 'WfQDTLrjvq', 'cLbD2RiHX1', 'qu3DV2UtU9', 'YZ4DPobOqM', 'woQD4R8BD3'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, RZUQGYQDOgsRHRAqv4.csHigh entropy of concatenated method names: 'u0vUoIiad5', 'JrbU8sfZEj', 've0Dc5jGF6', 'PwxDjOKoAO', 'Nv4UHwrak6', 'aVFUk1voNA', 'KcTUL7Y7VZ', 'j7TUpBD9T8', 'iyPUJwKohc', 'VfTUuB6RW5'
              Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, Gi4mvvUS94GkjKbif0.csHigh entropy of concatenated method names: 'jLFANL9Bcu', 'b0eA7lDbfw', 'SilAgddMd5', 'I2HASp1hBL', 'uBAAQexT4I', 'NBlAfKaRUx', 'BrLAC4xqLg', 'dQyAEgVnmD', 'TkOAhKv7IA', 'UHEAHLKm0D'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeFile created: C:\Users\user\AppData\Roaming\rRQnnfB.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              Source: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilege%SystemRoot%\System32\termsrv.dllSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDll127.0.0.1SYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType]+@
              Source: rRQnnfB.exe, 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              Source: rRQnnfB.exe, 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrudprpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilege%SystemRoot%\System32\termsrv.dllSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDll127.0.0.1SYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameType]+@
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rRQnnfB.exe PID: 7220, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: 880000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: 25A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: 45A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: 8850000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: 9850000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: 9A60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: AA60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: B1F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: C1F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: D1F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: 2970000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: 86E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: 6E00000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: 96E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: A6E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: AF80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeMemory allocated: BF80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5778Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1427Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6102Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1430Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe TID: 6948Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4500Thread sleep count: 5778 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4208Thread sleep time: -6456360425798339s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4888Thread sleep count: 1427 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6588Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7176Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3604Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exe TID: 7368Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeQueries volume information: C:\Users\user\AppData\Roaming\rRQnnfB.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\rRQnnfB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rRQnnfB.exe PID: 7220, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4099368.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.4036748.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe.3fd3b28.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.434f090.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rRQnnfB.exe.4332420.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              11
              Process Injection
              1
              Masquerading
              11
              Input Capture
              1
              Security Software Discovery
              Remote Services11
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              Scheduled Task/Job
              11
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Hidden Users
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Obfuscated Files or Information
              Cached Domain Credentials12
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1543577 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 28/10/2024 Architecture: WINDOWS Score: 100 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Sigma detected: Scheduled temp file as task from temp location 2->52 54 9 other signatures 2->54 7 SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe 7 2->7         started        11 rRQnnfB.exe 5 2->11         started        process3 file4 40 C:\Users\user\AppData\Roaming\rRQnnfB.exe, PE32 7->40 dropped 42 C:\Users\user\...\rRQnnfB.exe:Zone.Identifier, ASCII 7->42 dropped 44 C:\Users\user\AppData\Local\...\tmpE51C.tmp, XML 7->44 dropped 46 SecuriteInfo.com.W...n.28365.916.exe.log, ASCII 7->46 dropped 56 Contains functionality to hide user accounts 7->56 58 Uses schtasks.exe or at.exe to add and modify task schedules 7->58 60 Adds a directory exclusion to Windows Defender 7->60 13 powershell.exe 23 7->13         started        16 powershell.exe 23 7->16         started        18 schtasks.exe 1 7->18         started        26 5 other processes 7->26 62 Multi AV Scanner detection for dropped file 11->62 64 Machine Learning detection for dropped file 11->64 20 schtasks.exe 11->20         started        22 vbc.exe 11->22         started        24 vbc.exe 11->24         started        28 3 other processes 11->28 signatures5 process6 signatures7 66 Loading BitLocker PowerShell Module 13->66 30 WmiPrvSE.exe 13->30         started        32 conhost.exe 13->32         started        34 conhost.exe 16->34         started        36 conhost.exe 18->36         started        38 conhost.exe 20->38         started        process8

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe32%ReversingLabsWin32.Trojan.Generic
              SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe40%VirustotalBrowse
              SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\rRQnnfB.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\rRQnnfB.exe32%ReversingLabsWin32.Trojan.Generic
              C:\Users\user\AppData\Roaming\rRQnnfB.exe40%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.fontbureau.com0%URL Reputationsafe
              http://www.fontbureau.com/designersG0%URL Reputationsafe
              http://www.fontbureau.com/designers/?0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.fontbureau.com/designers?0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.fontbureau.com/designers0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.fontbureau.com/designers80%URL Reputationsafe
              http://www.fonts.com0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
              https://github.com/syohex/java-simple-mine-sweeperC:0%VirustotalBrowse
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              wznne1.duckdns.orgtrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://www.fontbureau.comSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.tiro.comSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.goodfont.co.krSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comlSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fonts.comSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sandoll.co.krSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://github.com/syohex/java-simple-mine-sweeperC:SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, rRQnnfB.exe, 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1869611688.000000000279F000.00000004.00000800.00020000.00000000.sdmp, rRQnnfB.exe, 0000000D.00000002.1918659052.0000000002A69000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sakkal.comSecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883842871.0000000006772000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe, 00000000.00000002.1883579784.0000000005070000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1543577
                Start date and time:2024-10-28 07:17:09 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 46s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:26
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                Detection:MAL
                Classification:mal100.troj.expl.evad.winEXE@35/15@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 71
                • Number of non-executed functions: 13
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                02:18:16API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe modified
                02:18:19API Interceptor39x Sleep call for process: powershell.exe modified
                02:18:22API Interceptor1x Sleep call for process: rRQnnfB.exe modified
                06:18:21Task SchedulerRun new task: rRQnnfB path: C:\Users\user\AppData\Roaming\rRQnnfB.exe
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1216
                Entropy (8bit):5.34331486778365
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                Malicious:true
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                Process:C:\Users\user\AppData\Roaming\rRQnnfB.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1216
                Entropy (8bit):5.34331486778365
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                Malicious:false
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):2232
                Entropy (8bit):5.3785452578096224
                Encrypted:false
                SSDEEP:48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//8PUyus:fLHyIFKL3IZ2KRH9Oug8s
                MD5:E29FF6D51247365B01A222502165B59F
                SHA1:D135C6EA63AB99E19E1DC6986E21E937DDEE5969
                SHA-256:0F619AB4B884683497272122273E6295AF759B288870BA64E0DB884BE905D769
                SHA-512:4EFD0B4000623C0654F455B1CDCEABEDFA7D4534C4E83E2731457658BCE0BB4FAC0CE8DD1C246666B883376DE243079006A8C82A3F5E8082A8A79AC9623ACC65
                Malicious:false
                Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                File Type:XML 1.0 document, ASCII text
                Category:dropped
                Size (bytes):1573
                Entropy (8bit):5.106240095570529
                Encrypted:false
                SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxALxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT11v
                MD5:C20562F13FE3263960DC65C83530D786
                SHA1:A2CDC595DF216ADE374A5160B5172A066F781948
                SHA-256:CEA7458FD573B0D78DC37FDFF17EBF199E451AECB11E1F5EB123F13A2653230B
                SHA-512:0B6D401923F3E6E39B44F03EEDE6CD92C093F453642EB048C7A8DAF023FCE3E4373939E731E8977F9967D4A42DEA7972D0B29BDFA10815A6A45FFBC98BFD188D
                Malicious:true
                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                Process:C:\Users\user\AppData\Roaming\rRQnnfB.exe
                File Type:XML 1.0 document, ASCII text
                Category:dropped
                Size (bytes):1573
                Entropy (8bit):5.106240095570529
                Encrypted:false
                SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxALxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT11v
                MD5:C20562F13FE3263960DC65C83530D786
                SHA1:A2CDC595DF216ADE374A5160B5172A066F781948
                SHA-256:CEA7458FD573B0D78DC37FDFF17EBF199E451AECB11E1F5EB123F13A2653230B
                SHA-512:0B6D401923F3E6E39B44F03EEDE6CD92C093F453642EB048C7A8DAF023FCE3E4373939E731E8977F9967D4A42DEA7972D0B29BDFA10815A6A45FFBC98BFD188D
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):735744
                Entropy (8bit):7.882213331390559
                Encrypted:false
                SSDEEP:12288:9qbjoMfzukYwBZ+DPWeGHutARp7ubVoSYOKe5KkohFISCX/B:sos2+HutANuprIiroJCP
                MD5:32BBE58D2336CD18C22D221A3836BD50
                SHA1:7B559B7160FA1F0DE211AFD3DCB81A41A2A7FD89
                SHA-256:066E985867D56271776AB61510202FFDD1BEC246FC15DD38DD17A38223D50D40
                SHA-512:66E3DD18D4BEAFFD40845F5B255B8C95C02BC1D72EC4A0FB831F1B6F48067599E89F8E9ABDFA8579E443F6960E8E90225C22BA0995A17C56C8282204F47017A4
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 32%
                • Antivirus: Virustotal, Detection: 40%, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0..&...........E... ...`....@.. ....................................@..................................D..O....`..............................|...T............................................ ............... ..H............text....%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............8..............@..B.................D......H.......`...........U...d^................................................r...p}.....r...p}......}.....(.......(.....*6.s....(....&*..*..0..k.......s........t-...o....t....oO...}....(/..........s....o....sG...(....&.{....o....o.....o....t.....{....oP....*..0............{....o....o......(/...o ....8......(!.....s"....sQ.......o....%..oP......o#......o$......o%.....o.....o&.....{c..........s'...o(.....().....{....o.....o*......(+.......(,...:o.............o-.....*..............
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Preview:[ZoneTransfer]....ZoneId=0
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.882213331390559
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Generic Win/DOS Executable (2004/3) 0.01%
                File name:SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                File size:735'744 bytes
                MD5:32bbe58d2336cd18c22d221a3836bd50
                SHA1:7b559b7160fa1f0de211afd3dcb81a41a2a7fd89
                SHA256:066e985867d56271776ab61510202ffdd1bec246fc15dd38dd17a38223d50d40
                SHA512:66e3dd18d4beaffd40845f5b255b8c95c02bc1d72ec4a0fb831f1b6f48067599e89f8e9abdfa8579e443f6960e8e90225c22ba0995a17c56c8282204f47017a4
                SSDEEP:12288:9qbjoMfzukYwBZ+DPWeGHutARp7ubVoSYOKe5KkohFISCX/B:sos2+HutANuprIiroJCP
                TLSH:46F40298332DCF19E5BD0BFE0862304047B127657161D7EF4EC625DB8AA2B814B1EE97
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0..&...........E... ...`....@.. ....................................@................................
                Icon Hash:36366464e4f39537
                Entrypoint:0x4b4502
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x671EDFD8 [Mon Oct 28 00:50:32 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xb44b00x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000xf90.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0e7c0x54.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000xb25080xb26005513eef5265ee137c97f151900b1cc4bFalse0.8720094056587246data7.890111172644623IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0xb60000xf900x100022ef4965cb87cca31222430a8a608cc9False0.60791015625data6.501930411066949IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0xb80000xc0x200c7a0a2ace1086b7f3a7a22f6e1add36eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0xb61000x928PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.7495733788395904
                RT_GROUP_ICON0xb6a380x14data1.05
                RT_VERSION0xb6a5c0x334data0.4292682926829268
                RT_MANIFEST0xb6da00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:02:18:15
                Start date:28/10/2024
                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"
                Imagebase:0x1b0000
                File size:735'744 bytes
                MD5 hash:32BBE58D2336CD18C22D221A3836BD50
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000000.00000002.1872203758.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:02:18:18
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.28365.916.exe"
                Imagebase:0xc70000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:02:18:18
                Start date:28/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:02:18:18
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rRQnnfB.exe"
                Imagebase:0xc70000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:02:18:18
                Start date:28/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:6
                Start time:02:18:18
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\schtasks.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpE51C.tmp"
                Imagebase:0x150000
                File size:187'904 bytes
                MD5 hash:48C2FE20575769DE916F48EF0676A965
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:7
                Start time:02:18:18
                Start date:28/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:8
                Start time:02:18:19
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Target ID:9
                Start time:02:18:19
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Target ID:10
                Start time:02:18:19
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Target ID:11
                Start time:02:18:19
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Target ID:12
                Start time:02:18:19
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Target ID:13
                Start time:02:18:21
                Start date:28/10/2024
                Path:C:\Users\user\AppData\Roaming\rRQnnfB.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\rRQnnfB.exe
                Imagebase:0x680000
                File size:735'744 bytes
                MD5 hash:32BBE58D2336CD18C22D221A3836BD50
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 0000000D.00000002.1920536185.00000000042C6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 32%, ReversingLabs
                • Detection: 40%, Virustotal, Browse
                Has exited:true

                Target ID:14
                Start time:02:18:21
                Start date:28/10/2024
                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Imagebase:0x7ff693ab0000
                File size:496'640 bytes
                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:15
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\SysWOW64\schtasks.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rRQnnfB" /XML "C:\Users\user\AppData\Local\Temp\tmpF613.tmp"
                Imagebase:0x150000
                File size:187'904 bytes
                MD5 hash:48C2FE20575769DE916F48EF0676A965
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:16
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:17
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:18
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:19
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:20
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:21
                Start time:02:18:23
                Start date:28/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Imagebase:0x450000
                File size:2'625'616 bytes
                MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:14.6%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:1.5%
                  Total number of Nodes:194
                  Total number of Limit Nodes:10
                  execution_graph 28256 87028a0 28257 87028ac 28256->28257 28261 8705700 28257->28261 28266 87056f1 28257->28266 28258 87028bd 28262 870571c 28261->28262 28271 8706627 28262->28271 28276 8706638 28262->28276 28263 87057c6 28263->28258 28267 870571c 28266->28267 28268 8706627 NtQueryInformationProcess 28267->28268 28269 8706638 NtQueryInformationProcess 28267->28269 28270 87057c6 28268->28270 28269->28270 28270->28258 28272 8706638 28271->28272 28281 8706678 28272->28281 28286 8706668 28272->28286 28273 870665e 28273->28263 28277 870664a 28276->28277 28279 8706678 NtQueryInformationProcess 28277->28279 28280 8706668 NtQueryInformationProcess 28277->28280 28278 870665e 28278->28263 28279->28278 28280->28278 28282 8706692 28281->28282 28291 8706b48 28282->28291 28295 8706b38 28282->28295 28283 87066b5 28283->28273 28287 8706678 28286->28287 28289 8706b48 NtQueryInformationProcess 28287->28289 28290 8706b38 NtQueryInformationProcess 28287->28290 28288 87066b5 28288->28273 28289->28288 28290->28288 28292 8706b6c 28291->28292 28299 8706780 28292->28299 28296 8706b6c 28295->28296 28297 8706780 NtQueryInformationProcess 28296->28297 28298 8706bf3 28297->28298 28298->28283 28300 8706ca8 NtQueryInformationProcess 28299->28300 28302 8706bf3 28300->28302 28302->28283 28303 884668 28304 884685 28303->28304 28305 884691 28304->28305 28309 8847b8 28304->28309 28314 883e40 28305->28314 28307 8846b0 28310 8847dd 28309->28310 28318 8848c8 28310->28318 28322 8848b9 28310->28322 28315 883e4b 28314->28315 28330 885cc4 28315->28330 28317 887030 28317->28307 28319 8848ef 28318->28319 28320 8849cc 28319->28320 28326 884510 28319->28326 28320->28320 28323 8848ef 28322->28323 28324 8849cc 28323->28324 28325 884510 CreateActCtxA 28323->28325 28324->28324 28325->28324 28327 885958 CreateActCtxA 28326->28327 28329 885a1b 28327->28329 28331 885ccf 28330->28331 28334 885ce4 28331->28334 28333 8870d5 28333->28317 28335 885cef 28334->28335 28338 885d14 28335->28338 28337 8871ba 28337->28333 28339 885d1f 28338->28339 28342 885d44 28339->28342 28341 8872ad 28341->28337 28343 885d4f 28342->28343 28345 8885ab 28343->28345 28348 88ac58 28343->28348 28344 8885e9 28344->28341 28345->28344 28352 88cd40 28345->28352 28357 88ac7f 28348->28357 28362 88ac90 28348->28362 28349 88ac6e 28349->28345 28354 88cd71 28352->28354 28353 88cd95 28353->28344 28354->28353 28376 88d2f8 28354->28376 28380 88d308 28354->28380 28358 88ac90 28357->28358 28366 88ad88 28358->28366 28371 88ad78 28358->28371 28359 88ac9f 28359->28349 28364 88ad88 GetModuleHandleW 28362->28364 28365 88ad78 GetModuleHandleW 28362->28365 28363 88ac9f 28363->28349 28364->28363 28365->28363 28367 88adbc 28366->28367 28368 88ad99 28366->28368 28367->28359 28368->28367 28369 88afc0 GetModuleHandleW 28368->28369 28370 88afed 28369->28370 28370->28359 28372 88adbc 28371->28372 28373 88ad99 28371->28373 28372->28359 28373->28372 28374 88afc0 GetModuleHandleW 28373->28374 28375 88afed 28374->28375 28375->28359 28377 88d315 28376->28377 28379 88d34f 28377->28379 28384 88cef4 28377->28384 28379->28353 28381 88d315 28380->28381 28382 88d34f 28381->28382 28383 88cef4 2 API calls 28381->28383 28382->28353 28383->28382 28386 88ceff 28384->28386 28385 88dc60 28386->28385 28388 88d01c 28386->28388 28389 88d027 28388->28389 28390 885d44 2 API calls 28389->28390 28391 88dccf 28390->28391 28391->28385 28392 88d668 DuplicateHandle 28393 88d6fe 28392->28393 28249 8707378 28251 870739c 28249->28251 28252 8706800 28251->28252 28253 8707cb8 OutputDebugStringW 28252->28253 28255 8707d37 28253->28255 28255->28251 28394 88d420 28395 88d466 GetCurrentProcess 28394->28395 28397 88d4b8 GetCurrentThread 28395->28397 28398 88d4b1 28395->28398 28399 88d4ee 28397->28399 28400 88d4f5 GetCurrentProcess 28397->28400 28398->28397 28399->28400 28403 88d52b 28400->28403 28401 88d553 GetCurrentThreadId 28402 88d584 28401->28402 28403->28401 28404 6f52e1c 28405 6f52b1c 28404->28405 28405->28404 28406 6f52b80 28405->28406 28410 6f55596 28405->28410 28420 6f55528 28405->28420 28429 6f55538 28405->28429 28406->28406 28411 6f55524 28410->28411 28413 6f55599 28410->28413 28412 6f55576 28411->28412 28438 6f55d53 28411->28438 28443 6f55a53 28411->28443 28448 6f559a5 28411->28448 28452 6f563ca 28411->28452 28456 6f55b1b 28411->28456 28460 6f56209 28411->28460 28412->28406 28413->28406 28421 6f55552 28420->28421 28422 6f559a5 2 API calls 28421->28422 28423 6f55a53 2 API calls 28421->28423 28424 6f55d53 2 API calls 28421->28424 28425 6f55576 28421->28425 28426 6f56209 2 API calls 28421->28426 28427 6f55b1b 2 API calls 28421->28427 28428 6f563ca PostMessageW 28421->28428 28422->28425 28423->28425 28424->28425 28425->28406 28426->28425 28427->28425 28428->28425 28430 6f55552 28429->28430 28431 6f55576 28430->28431 28432 6f559a5 2 API calls 28430->28432 28433 6f55a53 2 API calls 28430->28433 28434 6f55d53 2 API calls 28430->28434 28435 6f56209 2 API calls 28430->28435 28436 6f55b1b 2 API calls 28430->28436 28437 6f563ca PostMessageW 28430->28437 28431->28406 28432->28431 28433->28431 28434->28431 28435->28431 28436->28431 28437->28431 28439 6f55faf 28438->28439 28465 6f523b0 28439->28465 28469 6f523b8 28439->28469 28440 6f55fcd 28444 6f56210 28443->28444 28473 6f52560 28444->28473 28477 6f52568 28444->28477 28445 6f5602d 28445->28412 28445->28445 28481 6f526f6 28448->28481 28485 6f52700 28448->28485 28453 6f563db 28452->28453 28454 6f5641f 28453->28454 28489 6f5674a 28453->28489 28454->28412 28457 6f55b20 28456->28457 28497 6f522e0 28457->28497 28501 6f522da 28457->28501 28461 6f5620f 28460->28461 28462 6f5602d 28461->28462 28463 6f52560 ReadProcessMemory 28461->28463 28464 6f52568 ReadProcessMemory 28461->28464 28462->28412 28462->28462 28463->28462 28464->28462 28466 6f523a5 28465->28466 28466->28465 28467 6f52402 VirtualAllocEx 28466->28467 28468 6f52435 28467->28468 28468->28440 28470 6f523f8 VirtualAllocEx 28469->28470 28472 6f52435 28470->28472 28472->28440 28474 6f525b3 ReadProcessMemory 28473->28474 28476 6f525f7 28474->28476 28476->28445 28478 6f525b3 ReadProcessMemory 28477->28478 28480 6f525f7 28478->28480 28480->28445 28482 6f52700 CreateProcessA 28481->28482 28484 6f5294b 28482->28484 28486 6f52789 CreateProcessA 28485->28486 28488 6f5294b 28486->28488 28490 6f566f8 28489->28490 28493 6f5674e 28489->28493 28490->28454 28491 6f568e3 28491->28454 28493->28491 28494 6f507ec 28493->28494 28495 6f569d8 PostMessageW 28494->28495 28496 6f56a44 28495->28496 28496->28493 28498 6f52325 Wow64GetThreadContext 28497->28498 28500 6f5236d 28498->28500 28500->28457 28502 6f52325 Wow64GetThreadContext 28501->28502 28504 6f5236d 28502->28504 28504->28457
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID: (odq$4'dq$4'dq$4'dq
                  • API String ID: 0-3599379907
                  • Opcode ID: a111a2cdce97cce9c6be4923d752ebdfd5f3afd3dcc5323fc473883fab0d01d4
                  • Instruction ID: 191e359f5a74df4655fd703ac02f41a420f31d785b38d49bf960149cf76feb81
                  • Opcode Fuzzy Hash: a111a2cdce97cce9c6be4923d752ebdfd5f3afd3dcc5323fc473883fab0d01d4
                  • Instruction Fuzzy Hash: C0A27074A00609DFCB14CF68D484BAEBBF2FF89321F158569E4059B299D734E982CF61
                  APIs
                  • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 08706D27
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: InformationProcessQuery
                  • String ID:
                  • API String ID: 1778838933-0
                  • Opcode ID: 82e45857cb413698ec0b84f9992611e3d9d968b1935106dacda04197eab8f38c
                  • Instruction ID: d4daca7438e9f80d2f5cfe6d91b53f4d61586f4d11ad573e7aa69f7d5b73e3fc
                  • Opcode Fuzzy Hash: 82e45857cb413698ec0b84f9992611e3d9d968b1935106dacda04197eab8f38c
                  • Instruction Fuzzy Hash: AB21DBB5904359DFCB10CF9AD984ADEBBF5FB58320F10842AE918A7250D375A950CFA1
                  APIs
                  • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 08706D27
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: InformationProcessQuery
                  • String ID:
                  • API String ID: 1778838933-0
                  • Opcode ID: addfd5c6ce460f7fc7bea28102fc401fa433372851d153837b6fcce339fcc296
                  • Instruction ID: ed052b0cbfd7afffa2fb7a2493a6a38b59779de563ee152a02fa44899f9c95f7
                  • Opcode Fuzzy Hash: addfd5c6ce460f7fc7bea28102fc401fa433372851d153837b6fcce339fcc296
                  • Instruction Fuzzy Hash: F621DBB5900349DFCB10CF9AD984ADEFBF5FB48320F10842AE918A7250D375A954CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a299eb0234d5e410cc582eda6457d674beb5cf8cb9cd856b433cd56601dbc8eb
                  • Instruction ID: cb76af837c35d417be724cefd03b14a8e64b6372d54cda5a8e7450e73a263e9c
                  • Opcode Fuzzy Hash: a299eb0234d5e410cc582eda6457d674beb5cf8cb9cd856b433cd56601dbc8eb
                  • Instruction Fuzzy Hash: DE426D74E01228CFDB54CFA9D984B9DBBB2FB48311F1085A9D819A7395D734AE81CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: daaebf2d803c461f3faccb796fcda87f3b61d08384fd3878954fd6b6e544b9ce
                  • Instruction ID: f82d097900b6c72b03a42b24f6394e7d0a118bdcf79b22a4acab2a05ede2e1b8
                  • Opcode Fuzzy Hash: daaebf2d803c461f3faccb796fcda87f3b61d08384fd3878954fd6b6e544b9ce
                  • Instruction Fuzzy Hash: 6032C071915218CFDB50DF99C684A8EFBF2BF48312F55D199D808AB256CB30E981CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1f9870dbe1039d409c9a6eb5d909e2e82a39a77434babc8aeed33d6052e8e9a9
                  • Instruction ID: 554d370ff20f35668e5544d924d768f9bcc16d0914e6187e6e91864ebb390a6d
                  • Opcode Fuzzy Hash: 1f9870dbe1039d409c9a6eb5d909e2e82a39a77434babc8aeed33d6052e8e9a9
                  • Instruction Fuzzy Hash: 02E19B71B016008FEB69EB69C850BAEB7F6EF89300F15446EE646DB291CB35DD01CB52
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8cb38272fe9a979f0f83302b3cfba89a6936d56d1a4cf934a46d543ec186c6f1
                  • Instruction ID: e8a3dc59edf12a75052d0d6a00122be2ab032e9695f5d00a4d42d3c375e11c48
                  • Opcode Fuzzy Hash: 8cb38272fe9a979f0f83302b3cfba89a6936d56d1a4cf934a46d543ec186c6f1
                  • Instruction Fuzzy Hash: 15E11875E00219CFCB14DFA9C5809AEBBF2FF49305F249159D814AB39ADB30A942DF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d13ba238575b7794d2393489fc444f5dc22eb3c9d252050940c058c36c649492
                  • Instruction ID: 17f2aa620c4aec0313b44dda3ed4f3a0beb9d05fa5e0292a5b1117a15e85d5d3
                  • Opcode Fuzzy Hash: d13ba238575b7794d2393489fc444f5dc22eb3c9d252050940c058c36c649492
                  • Instruction Fuzzy Hash: 98615875E00209DFCF04DFE9D8849AEBBF2EF88311F108429E915A7394DB349906CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4b8304285d9c146755b658ac33675d278733afcb2bb2fd93fd76723eb0a0069b
                  • Instruction ID: 7ee74f5ffe2e7b505c2a57061f3e9f3082c09adf185af0393e8f8a60e9e6a03c
                  • Opcode Fuzzy Hash: 4b8304285d9c146755b658ac33675d278733afcb2bb2fd93fd76723eb0a0069b
                  • Instruction Fuzzy Hash: F561B274E01218CFDB18CFAAD984B9DBBF2FF88301F1481A9D819A7294D7359985CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b66bdfdc18ed4deb731609f62ac81ab603c7eac73fe3037afc2c8ce770e1ff16
                  • Instruction ID: a4fb983c4e6f2c4d34acf2fbbfffe2c0571f9673c8834a09c99b67327e1fa84c
                  • Opcode Fuzzy Hash: b66bdfdc18ed4deb731609f62ac81ab603c7eac73fe3037afc2c8ce770e1ff16
                  • Instruction Fuzzy Hash: CA51BF75D01218DFDB08CFEAD8446AEBBF2FF88301F10906AD819AB258DB345A46CF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3ed7044981d8a5b98763e1def9abe8fa411b81e8519aba5967d3b9fd3fb2d38b
                  • Instruction ID: 54b5815b3afd6b19ea1e53cc3559463f4b452b795114776c5972f722327e6a2f
                  • Opcode Fuzzy Hash: 3ed7044981d8a5b98763e1def9abe8fa411b81e8519aba5967d3b9fd3fb2d38b
                  • Instruction Fuzzy Hash: 5041C8B1E106188FEB58DF6AC84179EBBF2FFC9301F10C0A9D41CA6255DB345A859F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e5329fc135c021f1b7d4bf1b3e86423b4fe8c1557628965ad2157c007068732
                  • Instruction ID: 93a24cf858b8118ecb206b1cac9348255aab9f9a427bef2fa67377e3664cf8a0
                  • Opcode Fuzzy Hash: 0e5329fc135c021f1b7d4bf1b3e86423b4fe8c1557628965ad2157c007068732
                  • Instruction Fuzzy Hash: DC419075E006189FDB08DFAAD88469EBBF2BF88311F14C16AD418AB258DB345A46CF51

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 294 88d410-88d4af GetCurrentProcess 298 88d4b8-88d4ec GetCurrentThread 294->298 299 88d4b1-88d4b7 294->299 300 88d4ee-88d4f4 298->300 301 88d4f5-88d529 GetCurrentProcess 298->301 299->298 300->301 303 88d52b-88d531 301->303 304 88d532-88d54d call 88d5ef 301->304 303->304 307 88d553-88d582 GetCurrentThreadId 304->307 308 88d58b-88d5ed 307->308 309 88d584-88d58a 307->309 309->308
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 0088D49E
                  • GetCurrentThread.KERNEL32 ref: 0088D4DB
                  • GetCurrentProcess.KERNEL32 ref: 0088D518
                  • GetCurrentThreadId.KERNEL32 ref: 0088D571
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 2b3cf4ad4ddbeab9917aa665267cc936d8c74546422151b30aa027ca404a9306
                  • Instruction ID: 40ed4671444956d96213bd8921d9f7808fef93568ab951110bf1736d7bf4ec11
                  • Opcode Fuzzy Hash: 2b3cf4ad4ddbeab9917aa665267cc936d8c74546422151b30aa027ca404a9306
                  • Instruction Fuzzy Hash: 205166B09007498FDB18DFA9D548BAEBFF1FF88314F24845AE409A7291D7745984CB26

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 316 88d420-88d4af GetCurrentProcess 320 88d4b8-88d4ec GetCurrentThread 316->320 321 88d4b1-88d4b7 316->321 322 88d4ee-88d4f4 320->322 323 88d4f5-88d529 GetCurrentProcess 320->323 321->320 322->323 325 88d52b-88d531 323->325 326 88d532-88d54d call 88d5ef 323->326 325->326 329 88d553-88d582 GetCurrentThreadId 326->329 330 88d58b-88d5ed 329->330 331 88d584-88d58a 329->331 331->330
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 0088D49E
                  • GetCurrentThread.KERNEL32 ref: 0088D4DB
                  • GetCurrentProcess.KERNEL32 ref: 0088D518
                  • GetCurrentThreadId.KERNEL32 ref: 0088D571
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 7acdf34171c5e2fd6492ab9f50f7a63516e3d4e82f61f3e48f9934ce2df39684
                  • Instruction ID: 15db49f76f7cfd6fb0317bf676402756c6e519c4bbd154f035138899749ffe0a
                  • Opcode Fuzzy Hash: 7acdf34171c5e2fd6492ab9f50f7a63516e3d4e82f61f3e48f9934ce2df39684
                  • Instruction Fuzzy Hash: 105177B09003498FDB14DFAAD548B9EBBF1FF88314F24845AE409A7390D7746984CF66

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1151 6f526f6-6f52795 1154 6f52797-6f527a1 1151->1154 1155 6f527ce-6f527ee 1151->1155 1154->1155 1156 6f527a3-6f527a5 1154->1156 1162 6f52827-6f52856 1155->1162 1163 6f527f0-6f527fa 1155->1163 1157 6f527a7-6f527b1 1156->1157 1158 6f527c8-6f527cb 1156->1158 1160 6f527b5-6f527c4 1157->1160 1161 6f527b3 1157->1161 1158->1155 1160->1160 1164 6f527c6 1160->1164 1161->1160 1171 6f5288f-6f52949 CreateProcessA 1162->1171 1172 6f52858-6f52862 1162->1172 1163->1162 1165 6f527fc-6f527fe 1163->1165 1164->1158 1166 6f52821-6f52824 1165->1166 1167 6f52800-6f5280a 1165->1167 1166->1162 1169 6f5280c 1167->1169 1170 6f5280e-6f5281d 1167->1170 1169->1170 1170->1170 1173 6f5281f 1170->1173 1183 6f52952-6f529d8 1171->1183 1184 6f5294b-6f52951 1171->1184 1172->1171 1174 6f52864-6f52866 1172->1174 1173->1166 1176 6f52889-6f5288c 1174->1176 1177 6f52868-6f52872 1174->1177 1176->1171 1178 6f52874 1177->1178 1179 6f52876-6f52885 1177->1179 1178->1179 1179->1179 1181 6f52887 1179->1181 1181->1176 1194 6f529e8-6f529ec 1183->1194 1195 6f529da-6f529de 1183->1195 1184->1183 1197 6f529fc-6f52a00 1194->1197 1198 6f529ee-6f529f2 1194->1198 1195->1194 1196 6f529e0 1195->1196 1196->1194 1199 6f52a10-6f52a14 1197->1199 1200 6f52a02-6f52a06 1197->1200 1198->1197 1201 6f529f4 1198->1201 1203 6f52a26-6f52a2d 1199->1203 1204 6f52a16-6f52a1c 1199->1204 1200->1199 1202 6f52a08 1200->1202 1201->1197 1202->1199 1205 6f52a44 1203->1205 1206 6f52a2f-6f52a3e 1203->1206 1204->1203 1208 6f52a45 1205->1208 1206->1205 1208->1208
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F52936
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: fc9be91f54f31159805a3f2dd023092756955abb2466b819833a4ab51fa18da6
                  • Instruction ID: e8857b8b626cf1cbbda51533a11ce3e30fc627dbad7f73e35f3f14f1c1ac90bd
                  • Opcode Fuzzy Hash: fc9be91f54f31159805a3f2dd023092756955abb2466b819833a4ab51fa18da6
                  • Instruction Fuzzy Hash: F1914C71D00219CFDB64DFA8CC41BDEBBB2BF48314F15866AE908A7250DB749A85CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1209 6f52700-6f52795 1211 6f52797-6f527a1 1209->1211 1212 6f527ce-6f527ee 1209->1212 1211->1212 1213 6f527a3-6f527a5 1211->1213 1219 6f52827-6f52856 1212->1219 1220 6f527f0-6f527fa 1212->1220 1214 6f527a7-6f527b1 1213->1214 1215 6f527c8-6f527cb 1213->1215 1217 6f527b5-6f527c4 1214->1217 1218 6f527b3 1214->1218 1215->1212 1217->1217 1221 6f527c6 1217->1221 1218->1217 1228 6f5288f-6f52949 CreateProcessA 1219->1228 1229 6f52858-6f52862 1219->1229 1220->1219 1222 6f527fc-6f527fe 1220->1222 1221->1215 1223 6f52821-6f52824 1222->1223 1224 6f52800-6f5280a 1222->1224 1223->1219 1226 6f5280c 1224->1226 1227 6f5280e-6f5281d 1224->1227 1226->1227 1227->1227 1230 6f5281f 1227->1230 1240 6f52952-6f529d8 1228->1240 1241 6f5294b-6f52951 1228->1241 1229->1228 1231 6f52864-6f52866 1229->1231 1230->1223 1233 6f52889-6f5288c 1231->1233 1234 6f52868-6f52872 1231->1234 1233->1228 1235 6f52874 1234->1235 1236 6f52876-6f52885 1234->1236 1235->1236 1236->1236 1238 6f52887 1236->1238 1238->1233 1251 6f529e8-6f529ec 1240->1251 1252 6f529da-6f529de 1240->1252 1241->1240 1254 6f529fc-6f52a00 1251->1254 1255 6f529ee-6f529f2 1251->1255 1252->1251 1253 6f529e0 1252->1253 1253->1251 1256 6f52a10-6f52a14 1254->1256 1257 6f52a02-6f52a06 1254->1257 1255->1254 1258 6f529f4 1255->1258 1260 6f52a26-6f52a2d 1256->1260 1261 6f52a16-6f52a1c 1256->1261 1257->1256 1259 6f52a08 1257->1259 1258->1254 1259->1256 1262 6f52a44 1260->1262 1263 6f52a2f-6f52a3e 1260->1263 1261->1260 1265 6f52a45 1262->1265 1263->1262 1265->1265
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F52936
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 54678c5bd32ed6f1a328abacdebf48130e7cfe2ed736e52c88adf8e85c20bfdb
                  • Instruction ID: 327fff7f974c6ae31c81e38dadc62402ec3afe5d1ef233f4e32ecdcf9500177a
                  • Opcode Fuzzy Hash: 54678c5bd32ed6f1a328abacdebf48130e7cfe2ed736e52c88adf8e85c20bfdb
                  • Instruction Fuzzy Hash: 2B914C71D00219CFDB64DFA8C841BDDBBB2BF48314F15866AE908A7250DB749A85CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1266 88ad88-88ad97 1267 88ad99-88ada6 call 88a100 1266->1267 1268 88adc3-88adc7 1266->1268 1275 88ada8 1267->1275 1276 88adbc 1267->1276 1269 88adc9-88add3 1268->1269 1270 88addb-88ae1c 1268->1270 1269->1270 1277 88ae29-88ae37 1270->1277 1278 88ae1e-88ae26 1270->1278 1321 88adae call 88b010 1275->1321 1322 88adae call 88b020 1275->1322 1276->1268 1279 88ae39-88ae3e 1277->1279 1280 88ae5b-88ae5d 1277->1280 1278->1277 1283 88ae49 1279->1283 1284 88ae40-88ae47 call 88a10c 1279->1284 1282 88ae60-88ae67 1280->1282 1281 88adb4-88adb6 1281->1276 1285 88aef8-88afb8 1281->1285 1286 88ae69-88ae71 1282->1286 1287 88ae74-88ae7b 1282->1287 1289 88ae4b-88ae59 1283->1289 1284->1289 1316 88afba-88afbd 1285->1316 1317 88afc0-88afeb GetModuleHandleW 1285->1317 1286->1287 1290 88ae88-88ae91 call 88a11c 1287->1290 1291 88ae7d-88ae85 1287->1291 1289->1282 1297 88ae9e-88aea3 1290->1297 1298 88ae93-88ae9b 1290->1298 1291->1290 1299 88aec1-88aece 1297->1299 1300 88aea5-88aeac 1297->1300 1298->1297 1306 88aed0-88aeee 1299->1306 1307 88aef1-88aef7 1299->1307 1300->1299 1302 88aeae-88aebe call 88a12c call 88a13c 1300->1302 1302->1299 1306->1307 1316->1317 1318 88afed-88aff3 1317->1318 1319 88aff4-88b008 1317->1319 1318->1319 1321->1281 1322->1281
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0088AFDE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 081fca2939cf02de14d235adc7baa451cd4965fb03ccd9b02ae58640f55601b7
                  • Instruction ID: 03493acb8695c6bc431f303b40e7c3281238378f5bca78e5e91008db5cabcf14
                  • Opcode Fuzzy Hash: 081fca2939cf02de14d235adc7baa451cd4965fb03ccd9b02ae58640f55601b7
                  • Instruction Fuzzy Hash: 12714970A00B058FEB28EF69D44575ABBF1FF88304F00892EE546D7A90DB75E845CB92

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1433 88594d-885a19 CreateActCtxA 1435 885a1b-885a21 1433->1435 1436 885a22-885a7c 1433->1436 1435->1436 1443 885a8b-885a8f 1436->1443 1444 885a7e-885a81 1436->1444 1445 885aa0 1443->1445 1446 885a91-885a9d 1443->1446 1444->1443 1448 885aa1 1445->1448 1446->1445 1448->1448
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00885A09
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 4e94b390b9667cda2619aa9d9118ea7e56240c81d6270a6f80cc8b5ddbbd1571
                  • Instruction ID: df646efb47a8c2be415f775afdb02ddbfc913fbca367af4d8bac938ca9adfa9e
                  • Opcode Fuzzy Hash: 4e94b390b9667cda2619aa9d9118ea7e56240c81d6270a6f80cc8b5ddbbd1571
                  • Instruction Fuzzy Hash: 2041E0B0C00619CFDB28DFA9C984BDEBBB5FF48304F20816AD409AB255DB756946CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1449 884510-885a19 CreateActCtxA 1452 885a1b-885a21 1449->1452 1453 885a22-885a7c 1449->1453 1452->1453 1460 885a8b-885a8f 1453->1460 1461 885a7e-885a81 1453->1461 1462 885aa0 1460->1462 1463 885a91-885a9d 1460->1463 1461->1460 1465 885aa1 1462->1465 1463->1462 1465->1465
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00885A09
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: fe36e9e57937b39a1ec559841b7e92770143f53c6eb6065734bc94b625243aae
                  • Instruction ID: d752526a7e5f7de7974a5ff7a40b705edbfd82bda18b2b12c52f5729386e5da7
                  • Opcode Fuzzy Hash: fe36e9e57937b39a1ec559841b7e92770143f53c6eb6065734bc94b625243aae
                  • Instruction Fuzzy Hash: D841DFB0C0061DCFDB28DFA9C984B9EBBB5FF48304F20816AD409AB251DB756945CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1466 6f523b0-6f523b1 1467 6f523a5-6f523af 1466->1467 1468 6f523b3-6f523fb 1466->1468 1467->1466 1471 6f52402-6f52433 VirtualAllocEx 1468->1471 1472 6f52435-6f5243b 1471->1472 1473 6f5243c-6f52461 1471->1473 1472->1473
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F52426
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: f9d8916440de47d4a3c080a9f339707da212755aab32c499ac7e1d0e6587ab48
                  • Instruction ID: d05a07698a0579d5adeb3d96691db6375ff9bd6089ba609f1b4352123f11f860
                  • Opcode Fuzzy Hash: f9d8916440de47d4a3c080a9f339707da212755aab32c499ac7e1d0e6587ab48
                  • Instruction Fuzzy Hash: 3B21BB718043899FCB11DFAAC845ADFBFF5EF49320F14845AE515A7252C7399900CFA1
                  APIs
                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 06F5235E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 3762bc77a207f8699f96c72b1a49ec78ba3f5ee201c88626dc658604cfa0cc1f
                  • Instruction ID: 275307cd1aad8f39926ae2cea16374cdf07f1b5a90c00e06c65ee78524a02595
                  • Opcode Fuzzy Hash: 3762bc77a207f8699f96c72b1a49ec78ba3f5ee201c88626dc658604cfa0cc1f
                  • Instruction Fuzzy Hash: C7213AB1D002098FDB10DFAAC4857EEBBF4EF48324F148429D519A7240D7789A45CFA1
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F525E8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: b82ccdd438afe88ea0be9bc76042f6d5415df252ebc46b24a8356eda75e5786a
                  • Instruction ID: c5c6b63688f021e1092a7708d958763638fbb9a065023d6aed52580a7f9acd83
                  • Opcode Fuzzy Hash: b82ccdd438afe88ea0be9bc76042f6d5415df252ebc46b24a8356eda75e5786a
                  • Instruction Fuzzy Hash: 5A214AB1C00249DFCB10CFA9C881AEEFBF5FF48310F10842AE918A7250D7349911DB61
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0088D6EF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: f56843917d757cb6596aa99f2ed7b4671c1b316872b27f170955503cb2bded9f
                  • Instruction ID: 60ca38a06b2bba86970a7347ce0862321fcd0acbb90afc5a9bda1d30b1fb63c2
                  • Opcode Fuzzy Hash: f56843917d757cb6596aa99f2ed7b4671c1b316872b27f170955503cb2bded9f
                  • Instruction Fuzzy Hash: 4121D2B59002499FDB10CFAAD584AEEBBF5FB48320F14801AE918A3251D378A954CF60
                  APIs
                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 06F5235E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: ce850f52ac3bf30f2b9caf4ba062256ca2abb5496d1e229df3f11ddc203dd8e0
                  • Instruction ID: c7faeea34c91168cc5376b4798c3906dda3f117a448b4a12e708c26e8eefc4c5
                  • Opcode Fuzzy Hash: ce850f52ac3bf30f2b9caf4ba062256ca2abb5496d1e229df3f11ddc203dd8e0
                  • Instruction Fuzzy Hash: 7A2138B1D003098FDB10DFAAC4857EEBBF4EF48324F14842AD919A7240D778AA45CFA1
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F525E8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 010adb43c5b0517eb239f20a26d884d9cfe3fc0a8d5bc21293af6193aeb370c3
                  • Instruction ID: d8973ffffc24dcadaed394640a20047cfeedbe323cc7d68cb0f812bc5d3bc398
                  • Opcode Fuzzy Hash: 010adb43c5b0517eb239f20a26d884d9cfe3fc0a8d5bc21293af6193aeb370c3
                  • Instruction Fuzzy Hash: 4C2128B1C003499FCB10DFAAC981ADEFBF5FF48320F10842AE918A7240D7789900DBA1
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0088D6EF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: b5b221d42497652dc50c262fa0ad37be79289fa5a9ccf0f34a834e5bcc55776b
                  • Instruction ID: aa6626aed00507d865321413911b3ed3a12b22d1c23e6b0fde6e8d9d1f5561f3
                  • Opcode Fuzzy Hash: b5b221d42497652dc50c262fa0ad37be79289fa5a9ccf0f34a834e5bcc55776b
                  • Instruction Fuzzy Hash: C321E4B5900249DFDB10CF9AD984ADEFBF8FB48320F14801AE918A3350D378A954CFA0
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F56A35
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 61bcbce0b8c774fa7b66e718b9ca1b9a5903a760d762313422c2f26a457bde9d
                  • Instruction ID: 39c1a409dbf1b813b5a8a7bd6ec06b0aaca4b84b6a98f0bd5a15a61ecd5ef410
                  • Opcode Fuzzy Hash: 61bcbce0b8c774fa7b66e718b9ca1b9a5903a760d762313422c2f26a457bde9d
                  • Instruction Fuzzy Hash: 241134B1C00349DFCB60DF99D985BDABFF8EB48324F14844AE914A7212D375A944CFA1
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F52426
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 27884d83624375ca7c279cbb9906fcf3d1ce6ef0c96bd0bfae56235ecb71a016
                  • Instruction ID: 1c30a9e095d55aafbd96d872fae2cec4b1f9464465f43392c8d155e93e7be5a8
                  • Opcode Fuzzy Hash: 27884d83624375ca7c279cbb9906fcf3d1ce6ef0c96bd0bfae56235ecb71a016
                  • Instruction Fuzzy Hash: 8E1126B29002499FCB10DFAAC845ADEBFF5EF88320F248419E919A7251C775A940DFA1
                  APIs
                  • OutputDebugStringW.KERNELBASE(00000000), ref: 08707D28
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: DebugOutputString
                  • String ID:
                  • API String ID: 1166629820-0
                  • Opcode ID: b368ba605ff36ba82dd9026a23bb42640c3a3a53084098a7c7de3a5b72a684b3
                  • Instruction ID: 34ab2524f6ce6d1f7e08b26d7add0526de8d3a371672064a25c6a52e67609739
                  • Opcode Fuzzy Hash: b368ba605ff36ba82dd9026a23bb42640c3a3a53084098a7c7de3a5b72a684b3
                  • Instruction Fuzzy Hash: 961114B1C0465ADBCB14CF9AD545BAEFBF8EB48320F10811AD818A3240D775A900CFA1
                  APIs
                  • OutputDebugStringW.KERNELBASE(00000000), ref: 08707D28
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: DebugOutputString
                  • String ID:
                  • API String ID: 1166629820-0
                  • Opcode ID: e7ad83a6fcafca7a35e5ae32059db5ccbae483e032af1da3dcea961f12349cae
                  • Instruction ID: 412ad4a46b0017d37ea553cf80ad04565aa783450c67b49725b9660c49fdca51
                  • Opcode Fuzzy Hash: e7ad83a6fcafca7a35e5ae32059db5ccbae483e032af1da3dcea961f12349cae
                  • Instruction Fuzzy Hash: CF1126B1C0065ADFCB14CF9AD945BAEFBF8FB48320F10811AD818A3280D7756904CFA5
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F56A35
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 53a4ea1934f53b81bf94f17197c4fa688d48f8d1a2963cea796538f8286784ac
                  • Instruction ID: ddbf8d6b4121ae8940c1250fc72103923fd732d67d705b88acf9fe8711b4dd13
                  • Opcode Fuzzy Hash: 53a4ea1934f53b81bf94f17197c4fa688d48f8d1a2963cea796538f8286784ac
                  • Instruction Fuzzy Hash: C611F5B5800349DFDB50DF99C985BDEBFF8EB48320F10841AE914A7611D375A944CFA5
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0088AFDE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 035152891919dee6145766ff39aaeebeea424c088c80f2d16899af1bdd96d9ae
                  • Instruction ID: 2c9f5cb543c378b39988baa220cda41ff245f88fd0050965aa7436004f8dfcab
                  • Opcode Fuzzy Hash: 035152891919dee6145766ff39aaeebeea424c088c80f2d16899af1bdd96d9ae
                  • Instruction Fuzzy Hash: 05110FB5C002498FDB14DF9AC444A9EFBF4EF88324F10841AD928A7640D779A545CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1867790349.000000000082D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82d000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f2bfa512b7b078b4003479cca6450d8f2bf6d7c6abc4344afeef14b6426fe27
                  • Instruction ID: c22ae8c80ed97193c550e1605672a4ca0e11f8a9d07e13760b349fb894f72834
                  • Opcode Fuzzy Hash: 2f2bfa512b7b078b4003479cca6450d8f2bf6d7c6abc4344afeef14b6426fe27
                  • Instruction Fuzzy Hash: 0E2128B1504304DFDB05EF14E9C0B26BF65FB94324F24C569E9098B256C336E896DBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868213875.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_83d000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 045a14b2e5014cbf333e1f41532e009a3694cf81b03787df94c0104f42e7ff47
                  • Instruction ID: b36d32a991de711a2277325e601c8cbd73aa04c8e7ad8c3ee76710facf3d3256
                  • Opcode Fuzzy Hash: 045a14b2e5014cbf333e1f41532e009a3694cf81b03787df94c0104f42e7ff47
                  • Instruction Fuzzy Hash: 412107B1504304EFDB15DF14E5C0B26BB65FBC4318F24C56DE9498B252C73AE846CAA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868213875.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_83d000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4ea292863333ebaeaef46900a600d15fa67b8853458a2da4d53e6500758b9e35
                  • Instruction ID: e121dd8e2948ff65ce74106806c3d39277aab1a5d546b9ed1ec504db6e89ff84
                  • Opcode Fuzzy Hash: 4ea292863333ebaeaef46900a600d15fa67b8853458a2da4d53e6500758b9e35
                  • Instruction Fuzzy Hash: 222137B1504704DFCB18DF14E5D0B26BB65FBC4714F20C56DE84A8B256C33AD807CAA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1867790349.000000000082D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82d000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                  • Instruction ID: 4df481bca7fd9708687e8fd19fcca0aeff1e0e1c573d831e40460b92a2f18b00
                  • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                  • Instruction Fuzzy Hash: 59110672404340DFDB11DF00D5C0B16BF71FB94314F24C2A9D8094B656C33AD456CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868213875.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_83d000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction ID: b33b2f1dd25d581a7775904e469371f25ae6cee7a72d6beffaef6c5ddeceb07d
                  • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction Fuzzy Hash: 0D11DD75504780CFCB15CF14E5D4B15FBA2FB84714F24C6AAD8498B656C33AD84BCBA2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868213875.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_83d000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction ID: 9298bdeabd06505ab01dd1c7ee901445e32524fb66d50fc7629c72e6b7527587
                  • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction Fuzzy Hash: 2611BB75504380DFCB12CF10D5C0B16BBA2FB84314F24C6AAD8498B696C33AE84ACBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e58cc16919fde44fc9e7b1a3da752c36a44497f031987d790c6322700774c9c4
                  • Instruction ID: e871f285f5f684e255db96d5d3b2c41749ea940451d01e3d4a78b32feeb8af1b
                  • Opcode Fuzzy Hash: e58cc16919fde44fc9e7b1a3da752c36a44497f031987d790c6322700774c9c4
                  • Instruction Fuzzy Hash: F8E11A75E04119CFCB14DFA8C5909AEFBF2BF89305F248159D814AB39ADB30A942DF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eec88b5341e91c6de0ac178fa42e67f458878a1dba5b43978bb98b9b32d8b124
                  • Instruction ID: f22d0008de56bf777660c1f65169d7052b5c9de7be83ccdc7206476ca0f9c9bc
                  • Opcode Fuzzy Hash: eec88b5341e91c6de0ac178fa42e67f458878a1dba5b43978bb98b9b32d8b124
                  • Instruction Fuzzy Hash: 03E1F975E001198FDB14DFA9C5909AEFBF2BF89304F248169D914AB359D731AD82CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2cb549f86fa3d4b179ff47613ed13b38f3f180d265710cd56751cf49c4e9859c
                  • Instruction ID: 1eaa11478e9ee7cf66b5f84d8b3ff995e71ca303ea379edb5875ea75cbd24756
                  • Opcode Fuzzy Hash: 2cb549f86fa3d4b179ff47613ed13b38f3f180d265710cd56751cf49c4e9859c
                  • Instruction Fuzzy Hash: 89E1E675E041198FCB14DFA9C580AAEFBF2BF89304F248169D914AB359D730AD82CF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f1c16e5fe785f4240938ebfa46020d81ffb8f84b79aee58c4ebe3f7989d58b1c
                  • Instruction ID: 422454dd3889ca719a9af957c0c62b2a7af25941d960b03ead26a4b1e6be711d
                  • Opcode Fuzzy Hash: f1c16e5fe785f4240938ebfa46020d81ffb8f84b79aee58c4ebe3f7989d58b1c
                  • Instruction Fuzzy Hash: 37E1F975E001198FCB14DFA9C590AAEFBF2BF89304F249169D915AB359D730AD42CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 968ae500321d59466becf20c7278967f606dabb97b8ff6b9c7b44dc75d0950fb
                  • Instruction ID: 7d98ba7c12f0c1413a594e6c8adf354bfa76b4bb73c5986c8151d9b72a48d7c5
                  • Opcode Fuzzy Hash: 968ae500321d59466becf20c7278967f606dabb97b8ff6b9c7b44dc75d0950fb
                  • Instruction Fuzzy Hash: 75E11974E14119CFCB14DFA9C5809AEBBF2FF89305F248169D815AB35AD730A942DFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 604f9b4259fa8b9f4dbfd691b05159923d1139f9a7fcde9a9df7b735cd5b130d
                  • Instruction ID: 615ee203e2c4fba068f90102251732adbf363baffa6f6e9a5a3042a320ed90d3
                  • Opcode Fuzzy Hash: 604f9b4259fa8b9f4dbfd691b05159923d1139f9a7fcde9a9df7b735cd5b130d
                  • Instruction Fuzzy Hash: 88E1E974E04219CFCB14DFA9C5909AEBBF2FF49305F248169D815AB359D731A942CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e6345d5c6f3044a339d316395586663236f31f670f727eed753cdd4437f6424b
                  • Instruction ID: 7088c59cc4d5d340a5a92d32c07a2c02ee6d960ef6892ec9f407596081a35fe2
                  • Opcode Fuzzy Hash: e6345d5c6f3044a339d316395586663236f31f670f727eed753cdd4437f6424b
                  • Instruction Fuzzy Hash: 57E1EC74E00119CFCB14DFA9C5909AEBBF2FF89305F248159D415AB359D731A942DFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 705878e0d9dd5ffc35e2778b7df9e9447edaa378da2e4d280ad83008bdd6dd1c
                  • Instruction ID: 2ba00f17a94c3095a5dac19ebadf0182e7a0494021b1936c3250ea574168887e
                  • Opcode Fuzzy Hash: 705878e0d9dd5ffc35e2778b7df9e9447edaa378da2e4d280ad83008bdd6dd1c
                  • Instruction Fuzzy Hash: B6E1D874E00219CFCB14DFA9C5909AEBBF2FF89305F248169D415AB35AD730A942DFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1868392465.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 80b2bccb8f10127ed7e63184d602eecacc03171ea8cd2a3abc2139469e76c114
                  • Instruction ID: 5f29d788137d984de860d48d50eb99ecd415d7eecb3c2d85e5890c8262aed99c
                  • Opcode Fuzzy Hash: 80b2bccb8f10127ed7e63184d602eecacc03171ea8cd2a3abc2139469e76c114
                  • Instruction Fuzzy Hash: 2DA14D32E002198FCF15EFA4C84499EB7B2FF85304B1545BAEA05EB266DB31ED56CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 95fa17f8df5a99b70eec4de22ce35f7ce242a6f6e7fa685a22790fed5f1eff8d
                  • Instruction ID: f820d7604c26651c21f7e772f50172bc3326ab4d6f0c694cc0c2cb508857d019
                  • Opcode Fuzzy Hash: 95fa17f8df5a99b70eec4de22ce35f7ce242a6f6e7fa685a22790fed5f1eff8d
                  • Instruction Fuzzy Hash: E9716075E012198FCB04DFAAD984A9EFBF2BF88311F14D16AD418AB359D734A942CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1885207400.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f50000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8b25ca989bcc6c85d87f28d2bf3e27b94087d0e568c97e81157cb89709d7dadf
                  • Instruction ID: 906cc88dc8792047708efd5e7fc88b876d6a319cd5d59c62e97531dbd041f4d2
                  • Opcode Fuzzy Hash: 8b25ca989bcc6c85d87f28d2bf3e27b94087d0e568c97e81157cb89709d7dadf
                  • Instruction Fuzzy Hash: AE512E75E052198BDB14CFA9C9405AEFBF2BF89304F24C16AD908A7215D731AD42CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e0124f22b5687f659ced439d432ec26c610354a4ce390715996af25f25fe41f
                  • Instruction ID: 60813a5405aef40a466b17cc753b9ac7fbfcfb937338fe32a774e87af2b97953
                  • Opcode Fuzzy Hash: 0e0124f22b5687f659ced439d432ec26c610354a4ce390715996af25f25fe41f
                  • Instruction Fuzzy Hash: 6E51F974E102198FDB14CFA9C5809AEFBF2FF89305F248169D418B7259D731A942DFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1886159767.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8700000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ff6a9060f640baa4cfc0cfe61906c5f718cb7609f55ae9c46351106905e1a256
                  • Instruction ID: cafa6effa8be98e93217cac03fedf309570d9d6d08a56a6c70920ebdc74ea9c9
                  • Opcode Fuzzy Hash: ff6a9060f640baa4cfc0cfe61906c5f718cb7609f55ae9c46351106905e1a256
                  • Instruction Fuzzy Hash: 34516F75E016188FDB08CFAAD98469EFBF2FF88311F14C16AD418AB358DB3499468F51

                  Execution Graph

                  Execution Coverage:11.7%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:154
                  Total number of Limit Nodes:9
                  execution_graph 43423 2985968 43424 2985af3 43423->43424 43426 298598e 43423->43426 43426->43424 43427 29807ec 43426->43427 43428 2985be8 PostMessageW 43427->43428 43429 2985c54 43428->43429 43429->43426 43315 281ac90 43319 281ad88 43315->43319 43324 281ad78 43315->43324 43316 281ac9f 43320 281adbc 43319->43320 43321 281ad99 43319->43321 43320->43316 43321->43320 43322 281afc0 GetModuleHandleW 43321->43322 43323 281afed 43322->43323 43323->43316 43325 281adbc 43324->43325 43326 281ad99 43324->43326 43325->43316 43326->43325 43327 281afc0 GetModuleHandleW 43326->43327 43328 281afed 43327->43328 43328->43316 43329 281d420 43330 281d466 43329->43330 43334 281d600 43330->43334 43337 281d5ef 43330->43337 43331 281d553 43340 281cfbc 43334->43340 43338 281d62e 43337->43338 43339 281cfbc DuplicateHandle 43337->43339 43338->43331 43339->43338 43341 281d668 DuplicateHandle 43340->43341 43342 281d62e 43341->43342 43342->43331 43430 6cb7378 43432 6cb739c 43430->43432 43434 6cb6820 43432->43434 43438 6cb682c 43432->43438 43435 6cb7cb8 OutputDebugStringW 43434->43435 43437 6cb7d37 43435->43437 43437->43432 43439 6cb7d68 CloseHandle 43438->43439 43441 6cb7dd6 43439->43441 43441->43432 43237 2982e1c 43238 2982b1c 43237->43238 43239 2982b2e 43238->43239 43242 2984748 43238->43242 43250 2984743 43238->43250 43239->43239 43243 2984762 43242->43243 43248 2984786 43243->43248 43258 2984bb5 43243->43258 43262 2984c63 43243->43262 43267 2984f63 43243->43267 43272 2984d2b 43243->43272 43276 2985419 43243->43276 43248->43239 43251 2984762 43250->43251 43252 2984786 43251->43252 43253 2985419 2 API calls 43251->43253 43254 2984d2b 2 API calls 43251->43254 43255 2984f63 2 API calls 43251->43255 43256 2984c63 2 API calls 43251->43256 43257 2984bb5 2 API calls 43251->43257 43252->43239 43253->43252 43254->43252 43255->43252 43256->43252 43257->43252 43281 2982700 43258->43281 43285 29826f4 43258->43285 43259 2984be5 43259->43248 43263 2985420 43262->43263 43290 2982568 43263->43290 43294 2982560 43263->43294 43264 298523d 43264->43248 43264->43264 43268 29851bf 43267->43268 43299 29823b8 43268->43299 43303 29823b3 43268->43303 43269 29851dd 43273 2984d30 43272->43273 43307 29822d8 43273->43307 43311 29822e0 43273->43311 43277 298541f 43276->43277 43278 298523d 43277->43278 43279 2982568 ReadProcessMemory 43277->43279 43280 2982560 ReadProcessMemory 43277->43280 43278->43248 43279->43278 43280->43278 43282 298271b CreateProcessA 43281->43282 43284 298294b 43282->43284 43287 29826c1 43285->43287 43286 29826c3 43286->43259 43287->43286 43288 29828ee CreateProcessA 43287->43288 43289 298294b 43288->43289 43291 29825b3 ReadProcessMemory 43290->43291 43293 29825f7 43291->43293 43293->43264 43295 298252d 43294->43295 43296 2982563 ReadProcessMemory 43294->43296 43295->43264 43298 29825f7 43296->43298 43298->43264 43300 29823f8 VirtualAllocEx 43299->43300 43302 2982435 43300->43302 43302->43269 43304 29823f8 VirtualAllocEx 43303->43304 43306 2982435 43304->43306 43306->43269 43308 2982325 Wow64GetThreadContext 43307->43308 43310 298236d 43308->43310 43310->43273 43312 2982325 Wow64GetThreadContext 43311->43312 43314 298236d 43312->43314 43314->43273 43343 2814668 43344 281466a 43343->43344 43345 2814691 43344->43345 43347 28147b8 43344->43347 43348 28147dd 43347->43348 43352 28148b9 43348->43352 43356 28148c8 43348->43356 43354 28148ef 43352->43354 43353 28149cc 43353->43353 43354->43353 43360 2814510 43354->43360 43357 28148ef 43356->43357 43358 28149cc 43357->43358 43359 2814510 CreateActCtxA 43357->43359 43359->43358 43361 2815958 CreateActCtxA 43360->43361 43363 2815a1b 43361->43363 43364 4fa4050 43365 4fa4092 43364->43365 43367 4fa4099 43364->43367 43366 4fa40ea CallWindowProcW 43365->43366 43365->43367 43366->43367 43368 6cb28a0 43369 6cb28ac 43368->43369 43370 6cb28b7 43369->43370 43375 6cb2898 43369->43375 43371 6cb28bd 43370->43371 43381 6cb56f1 43370->43381 43386 6cb5700 43370->43386 43376 6cb289d 43375->43376 43378 6cb28c6 43376->43378 43379 6cb56f1 NtQueryInformationProcess 43376->43379 43380 6cb5700 NtQueryInformationProcess 43376->43380 43377 6cb28bd 43377->43370 43378->43370 43379->43377 43380->43377 43382 6cb571c 43381->43382 43391 6cb6638 43382->43391 43396 6cb6627 43382->43396 43383 6cb57c6 43383->43371 43387 6cb571c 43386->43387 43389 6cb6638 NtQueryInformationProcess 43387->43389 43390 6cb6627 NtQueryInformationProcess 43387->43390 43388 6cb57c6 43388->43371 43389->43388 43390->43388 43392 6cb664a 43391->43392 43401 6cb6668 43392->43401 43406 6cb6678 43392->43406 43393 6cb665e 43393->43383 43397 6cb664a 43396->43397 43399 6cb6668 NtQueryInformationProcess 43397->43399 43400 6cb6678 NtQueryInformationProcess 43397->43400 43398 6cb665e 43398->43383 43399->43398 43400->43398 43402 6cb6692 43401->43402 43411 6cb6b48 43402->43411 43415 6cb6b38 43402->43415 43403 6cb66b5 43403->43393 43407 6cb6692 43406->43407 43409 6cb6b48 NtQueryInformationProcess 43407->43409 43410 6cb6b38 NtQueryInformationProcess 43407->43410 43408 6cb66b5 43408->43393 43409->43408 43410->43408 43412 6cb6b6c 43411->43412 43419 6cb6780 43412->43419 43416 6cb6b6c 43415->43416 43417 6cb6780 NtQueryInformationProcess 43416->43417 43418 6cb6bf3 43417->43418 43418->43403 43420 6cb6ca8 NtQueryInformationProcess 43419->43420 43422 6cb6bf3 43420->43422 43422->43403
                  APIs
                  • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 06CB6D27
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: InformationProcessQuery
                  • String ID:
                  • API String ID: 1778838933-0
                  • Opcode ID: 2b7f45d5d610370d550c35dc0f4de52fc99ea81e4347496ac485411167773277
                  • Instruction ID: a2ab8deee10241c8a1d73c5f2d614c0ddab0de0520009b7c58b80d2533322076
                  • Opcode Fuzzy Hash: 2b7f45d5d610370d550c35dc0f4de52fc99ea81e4347496ac485411167773277
                  • Instruction Fuzzy Hash: D43146B5D04389DFCB11CFAAD985ADEBFF4BF09310F24845AE958A7251C3359900CBA1
                  APIs
                  • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 06CB6D27
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: InformationProcessQuery
                  • String ID:
                  • API String ID: 1778838933-0
                  • Opcode ID: 821a0759f25d30ecf7015388196b5dc3f179406316e162229cc6ce74d65b1fad
                  • Instruction ID: c4f17943c91af128de045a2541bd6712dd441ff9b817b570e5bb7da6c35fd07a
                  • Opcode Fuzzy Hash: 821a0759f25d30ecf7015388196b5dc3f179406316e162229cc6ce74d65b1fad
                  • Instruction Fuzzy Hash: 8021AEB5901349DFCB10DF9AD984ADEFBF4FB48320F20842AE918A7210D375A954CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2109 29826f4-29826f5 2110 29826c1 2109->2110 2111 29826f7-29826f8 2109->2111 2112 298271b-2982795 2110->2112 2113 29826c3 2110->2113 2114 29826fb-2982719 2111->2114 2115 29826c5 2111->2115 2120 29827ce-29827ee 2112->2120 2121 2982797-29827a1 2112->2121 2113->2115 2114->2112 2116 29826ca-29826e8 2115->2116 2117 29826c5 call 29826ca 2115->2117 2117->2116 2129 29827f0-29827fa 2120->2129 2130 2982827-2982856 2120->2130 2121->2120 2122 29827a3-29827a5 2121->2122 2123 29827c8-29827cb 2122->2123 2124 29827a7-29827b1 2122->2124 2123->2120 2127 29827b3 2124->2127 2128 29827b5-29827c4 2124->2128 2127->2128 2128->2128 2131 29827c6 2128->2131 2129->2130 2132 29827fc-29827fe 2129->2132 2136 2982858-2982862 2130->2136 2137 298288f-2982949 CreateProcessA 2130->2137 2131->2123 2134 2982800-298280a 2132->2134 2135 2982821-2982824 2132->2135 2138 298280c 2134->2138 2139 298280e-298281d 2134->2139 2135->2130 2136->2137 2140 2982864-2982866 2136->2140 2150 298294b-2982951 2137->2150 2151 2982952-29829d8 2137->2151 2138->2139 2139->2139 2141 298281f 2139->2141 2142 2982868-2982872 2140->2142 2143 2982889-298288c 2140->2143 2141->2135 2145 2982874 2142->2145 2146 2982876-2982885 2142->2146 2143->2137 2145->2146 2146->2146 2147 2982887 2146->2147 2147->2143 2150->2151 2161 29829e8-29829ec 2151->2161 2162 29829da-29829de 2151->2162 2164 29829fc-2982a00 2161->2164 2165 29829ee-29829f2 2161->2165 2162->2161 2163 29829e0 2162->2163 2163->2161 2167 2982a10-2982a14 2164->2167 2168 2982a02-2982a06 2164->2168 2165->2164 2166 29829f4 2165->2166 2166->2164 2169 2982a26-2982a2d 2167->2169 2170 2982a16-2982a1c 2167->2170 2168->2167 2171 2982a08 2168->2171 2172 2982a2f-2982a3e 2169->2172 2173 2982a44 2169->2173 2170->2169 2171->2167 2172->2173 2175 2982a45 2173->2175 2175->2175
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02982936
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 21edd65ef2e61898b4c610b512bd02b30a1df6a38a95b70c2c8b3aca6faeddc3
                  • Instruction ID: d39e134a583bef5c8f2a9b97945242c0de8a4b5af7eda0484bd5109113f01704
                  • Opcode Fuzzy Hash: 21edd65ef2e61898b4c610b512bd02b30a1df6a38a95b70c2c8b3aca6faeddc3
                  • Instruction Fuzzy Hash: F5A16C71D002598FEF20DFA8C941BEDBBB6FF48314F1885AAD809A7290D7759981CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2176 2982700-2982795 2179 29827ce-29827ee 2176->2179 2180 2982797-29827a1 2176->2180 2187 29827f0-29827fa 2179->2187 2188 2982827-2982856 2179->2188 2180->2179 2181 29827a3-29827a5 2180->2181 2182 29827c8-29827cb 2181->2182 2183 29827a7-29827b1 2181->2183 2182->2179 2185 29827b3 2183->2185 2186 29827b5-29827c4 2183->2186 2185->2186 2186->2186 2189 29827c6 2186->2189 2187->2188 2190 29827fc-29827fe 2187->2190 2194 2982858-2982862 2188->2194 2195 298288f-2982949 CreateProcessA 2188->2195 2189->2182 2192 2982800-298280a 2190->2192 2193 2982821-2982824 2190->2193 2196 298280c 2192->2196 2197 298280e-298281d 2192->2197 2193->2188 2194->2195 2198 2982864-2982866 2194->2198 2208 298294b-2982951 2195->2208 2209 2982952-29829d8 2195->2209 2196->2197 2197->2197 2199 298281f 2197->2199 2200 2982868-2982872 2198->2200 2201 2982889-298288c 2198->2201 2199->2193 2203 2982874 2200->2203 2204 2982876-2982885 2200->2204 2201->2195 2203->2204 2204->2204 2205 2982887 2204->2205 2205->2201 2208->2209 2219 29829e8-29829ec 2209->2219 2220 29829da-29829de 2209->2220 2222 29829fc-2982a00 2219->2222 2223 29829ee-29829f2 2219->2223 2220->2219 2221 29829e0 2220->2221 2221->2219 2225 2982a10-2982a14 2222->2225 2226 2982a02-2982a06 2222->2226 2223->2222 2224 29829f4 2223->2224 2224->2222 2227 2982a26-2982a2d 2225->2227 2228 2982a16-2982a1c 2225->2228 2226->2225 2229 2982a08 2226->2229 2230 2982a2f-2982a3e 2227->2230 2231 2982a44 2227->2231 2228->2227 2229->2225 2230->2231 2233 2982a45 2231->2233 2233->2233
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02982936
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 1d87fe074bccb65d40906566ccc6a0a02343081fc20ecfba945c7bced46faffb
                  • Instruction ID: 324a44001f329bcd359dce727434e69ac70fc364a74ab7e692c07476a41391ad
                  • Opcode Fuzzy Hash: 1d87fe074bccb65d40906566ccc6a0a02343081fc20ecfba945c7bced46faffb
                  • Instruction Fuzzy Hash: 0A916C71D002598FEF20DF69C941BEDBBB6BF48314F1881A9DC09A7280DB759981CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2234 281ad88-281ad97 2235 281adc3-281adc7 2234->2235 2236 281ad99-281ada6 call 281a100 2234->2236 2238 281adc9-281add3 2235->2238 2239 281addb-281ae1c 2235->2239 2242 281ada8 2236->2242 2243 281adbc 2236->2243 2238->2239 2245 281ae29-281ae37 2239->2245 2246 281ae1e-281ae26 2239->2246 2289 281adae call 281b010 2242->2289 2290 281adae call 281b020 2242->2290 2243->2235 2247 281ae39-281ae3e 2245->2247 2248 281ae5b-281ae5d 2245->2248 2246->2245 2250 281ae40-281ae47 call 281a10c 2247->2250 2251 281ae49 2247->2251 2253 281ae60-281ae67 2248->2253 2249 281adb4-281adb6 2249->2243 2252 281aef8-281afb8 2249->2252 2255 281ae4b-281ae59 2250->2255 2251->2255 2284 281afc0-281afeb GetModuleHandleW 2252->2284 2285 281afba-281afbd 2252->2285 2256 281ae74-281ae7b 2253->2256 2257 281ae69-281ae71 2253->2257 2255->2253 2260 281ae88-281ae91 call 281a11c 2256->2260 2261 281ae7d-281ae85 2256->2261 2257->2256 2265 281ae93-281ae9b 2260->2265 2266 281ae9e-281aea3 2260->2266 2261->2260 2265->2266 2267 281aec1-281aece 2266->2267 2268 281aea5-281aeac 2266->2268 2275 281aef1-281aef7 2267->2275 2276 281aed0-281aeee 2267->2276 2268->2267 2270 281aeae-281aebe call 281a12c call 281a13c 2268->2270 2270->2267 2276->2275 2286 281aff4-281b008 2284->2286 2287 281afed-281aff3 2284->2287 2285->2284 2287->2286 2289->2249 2290->2249
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0281AFDE
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 53375ee6764956dc04c504908827ab4388287215efa66f0fda4b4c2da8090a9c
                  • Instruction ID: d306ec14058fe42b79abfa59a1238d4c54f93e178a147fb48a501afef0038231
                  • Opcode Fuzzy Hash: 53375ee6764956dc04c504908827ab4388287215efa66f0fda4b4c2da8090a9c
                  • Instruction Fuzzy Hash: 4C7125B8A01B058FDB28DF69D44475ABBF5FF88304F00892DD48AD7A80DB75E845CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2401 281594d-28159cc 2402 28159cf-2815a19 CreateActCtxA 2401->2402 2404 2815a22-2815a7c 2402->2404 2405 2815a1b-2815a21 2402->2405 2412 2815a8b-2815a8f 2404->2412 2413 2815a7e-2815a81 2404->2413 2405->2404 2414 2815a91-2815a9d 2412->2414 2415 2815aa0-2815ad0 2412->2415 2413->2412 2414->2415 2419 2815a82-2815a89 2415->2419 2420 2815ad2-2815b54 2415->2420 2419->2412
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 02815A09
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 5306726a41707363d3702df9147af81b29107e44064dd5a94c275b3726262ce1
                  • Instruction ID: 59fd07cb5abbae6a676805d70ef475c8985c3a8e2b84386029384098199ebdc4
                  • Opcode Fuzzy Hash: 5306726a41707363d3702df9147af81b29107e44064dd5a94c275b3726262ce1
                  • Instruction Fuzzy Hash: 8F41E6B4C00619CFDB24CFA9C984BDDBBB5FF49304F60806AD409AB251D775694ACF50
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 02815A09
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 0f30b154756a2fa6a6901554d1ecf5735291bb93cf96e9962e1cb86a3300e635
                  • Instruction ID: 237a2d652939a4b8eaed32ed4dcf4bd4f3ba22bca693c79ebfeeccf2dc4ed33a
                  • Opcode Fuzzy Hash: 0f30b154756a2fa6a6901554d1ecf5735291bb93cf96e9962e1cb86a3300e635
                  • Instruction Fuzzy Hash: 6741C3B4C0071DCBDB24CFA9C984B9EBBB5BF88304F60805AD409AB295DB756949CF90
                  APIs
                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 04FA4111
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1922792803.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_4fa0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: CallProcWindow
                  • String ID:
                  • API String ID: 2714655100-0
                  • Opcode ID: f3d6c5b5f5cb2d825e3fc0f44a5400db908065426bd79956dceb46d7ea460e96
                  • Instruction ID: f756a6565c8aee59ceabaf44bd9de7accec33cb7ffcb43d78046ff3f16425e25
                  • Opcode Fuzzy Hash: f3d6c5b5f5cb2d825e3fc0f44a5400db908065426bd79956dceb46d7ea460e96
                  • Instruction Fuzzy Hash: E94138B9A00319DFDB14CF89C848AAABBF5FF88314F24C459D519AB321D375A841CFA1
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c7febf0e1f80017ef931ad954a4a12322de459ddb8edcac73651f8d98ed5360b
                  • Instruction ID: addaacc5bd5629c1a9a4c81aac6e777c0a0b9bf870f2705060c0d94a1a49d7e9
                  • Opcode Fuzzy Hash: c7febf0e1f80017ef931ad954a4a12322de459ddb8edcac73651f8d98ed5360b
                  • Instruction Fuzzy Hash: D631C2B8804748CFDB11CFA8C9947DDBBB5FF96308F944189C015AB2D6C779A90ACB11
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 029825E8
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 6039298a8a11c9adbfd9be56cf172caa09bb7f9a9dc87be704dd8d5141457c3a
                  • Instruction ID: eb0b3cf167182c7c825077fb6363d0f92f787278020844799ed9df15341ef4f3
                  • Opcode Fuzzy Hash: 6039298a8a11c9adbfd9be56cf172caa09bb7f9a9dc87be704dd8d5141457c3a
                  • Instruction Fuzzy Hash: D03188B6C003899FCB10DFA9D941BEEBBF1FF48320F14842AE968A7241C7389505DB61
                  APIs
                  • OutputDebugStringW.KERNELBASE(00000000), ref: 06CB7D28
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: DebugOutputString
                  • String ID:
                  • API String ID: 1166629820-0
                  • Opcode ID: 56fc6ddc53394536111523bd874622d0c5744b90ef122bf35ca452ec57a8722b
                  • Instruction ID: 50d97ab6716cdc4841b129921dd93e314810e335196c2d00151c164a0bbc1e2b
                  • Opcode Fuzzy Hash: 56fc6ddc53394536111523bd874622d0c5744b90ef122bf35ca452ec57a8722b
                  • Instruction Fuzzy Hash: EA317CB2C0825A9FDB01DFA9D8917DABFB4EF85314F14809AD818A7251E734A814CBE5
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0281D62E,?,?,?,?,?), ref: 0281D6EF
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: a1e663ab991cb7960c65a37687870b8c476c78d81227d6bab36d104d91f35127
                  • Instruction ID: 03786e402c29fa8ebd72c7c6ed93c66ed24e60534261729844c5dce1fda4f0ec
                  • Opcode Fuzzy Hash: a1e663ab991cb7960c65a37687870b8c476c78d81227d6bab36d104d91f35127
                  • Instruction Fuzzy Hash: F12105B59002099FDB10CFAAD584ADEBFF8EB48314F14841AE918A7350D378A940CFA4
                  APIs
                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0298235E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 33dce842dbe114d02ac8c8ce45d1dfb899d536a87c01e2137127d8029fba2251
                  • Instruction ID: 5deda43062c989f73951ac3c499d0570c9600a356b22f67aaa338226b54fe81e
                  • Opcode Fuzzy Hash: 33dce842dbe114d02ac8c8ce45d1dfb899d536a87c01e2137127d8029fba2251
                  • Instruction Fuzzy Hash: 642157B1D003099FDB14DFAAC485BAEBBF4EF88324F14842AD419A7240C7789945CFA1
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0281D62E,?,?,?,?,?), ref: 0281D6EF
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 6fc31219dab8801ee9bf5abb85900ec0901719296126ed9d3e394dcffaf95815
                  • Instruction ID: 5881660013a4d031884942cb01b5efb44bacbc2b6aadb53cf1b68d92c26b79b8
                  • Opcode Fuzzy Hash: 6fc31219dab8801ee9bf5abb85900ec0901719296126ed9d3e394dcffaf95815
                  • Instruction Fuzzy Hash: 4921E3B59002499FDB10CFAAD584ADEFBF8EB48324F14841AE918A7350D378A944CFA5
                  APIs
                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0298235E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: eab5ee1a14f3ebc7e12470ed13c65407636aa41b055c88418eeafd4e3ebd2a21
                  • Instruction ID: 328f9fa8710db69084e827578508aa69a2d5c074f8a88d55ce7321a7deda9db6
                  • Opcode Fuzzy Hash: eab5ee1a14f3ebc7e12470ed13c65407636aa41b055c88418eeafd4e3ebd2a21
                  • Instruction Fuzzy Hash: F82138B1D003098FDB10DFAAC4857EEBBF8EF48324F14842AD519A7240D778A945CFA5
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 029825E8
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: c7876c22014c2b705b1bb255f690b554c9d1d683780a131ce959bafee69ad052
                  • Instruction ID: ae1cb08349cdcb28352af3515dfd29a07f189542ce65b954e9d0b8619a32088c
                  • Opcode Fuzzy Hash: c7876c22014c2b705b1bb255f690b554c9d1d683780a131ce959bafee69ad052
                  • Instruction Fuzzy Hash: 8E2139B1D003499FDB10DFAAC881ADEFBF5FF48320F54842AE918A7240C7799501DBA5
                  APIs
                  • OutputDebugStringW.KERNELBASE(00000000), ref: 06CB7D28
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: DebugOutputString
                  • String ID:
                  • API String ID: 1166629820-0
                  • Opcode ID: c2f7ed6f9a760f82f30a5a5b967f6ce7cc55575d6af695c7e754ef42e7949182
                  • Instruction ID: 74f5ffc0af18a6d98d492b4de28ed4b1efa16ad8b53f96042509a4ebd2f68360
                  • Opcode Fuzzy Hash: c2f7ed6f9a760f82f30a5a5b967f6ce7cc55575d6af695c7e754ef42e7949182
                  • Instruction Fuzzy Hash: AE1114B5C0065A8FCB10CFA9E945AEEFBB4FF48724F24815AD818B7640D3746614CFA1
                  APIs
                  • OutputDebugStringW.KERNELBASE(00000000), ref: 06CB7D28
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: DebugOutputString
                  • String ID:
                  • API String ID: 1166629820-0
                  • Opcode ID: c2abb4d5fb0debe0c5ccecdc6d300715026ba98b8c798c46cff4b70b99530cfc
                  • Instruction ID: 2bd78833115a71a79e52d7824dfdf37532f2fef2954cda7afb0b48f70c148dd6
                  • Opcode Fuzzy Hash: c2abb4d5fb0debe0c5ccecdc6d300715026ba98b8c798c46cff4b70b99530cfc
                  • Instruction Fuzzy Hash: 991114B1C046599BCB10CF9AE544AEEFBF4EB88320F14811AD818A7240D374A900CFE5
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02982426
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 919f52c1fb8dc325933bcbf77adf094ffd1d0ddf90a4428650600f93b3130b05
                  • Instruction ID: 53cf2bc61dc73d63ae1639e55f33a3f28dc94b120570a337e0c1fdff50b3f322
                  • Opcode Fuzzy Hash: 919f52c1fb8dc325933bcbf77adf094ffd1d0ddf90a4428650600f93b3130b05
                  • Instruction Fuzzy Hash: E21156B29002499FCB10DFAAC845ADFBFF9EF88324F248419E919A7250C775A500DFA1
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02982426
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 189aa2914e4c74a73f832e2b49fedffbe61148eb39aebf378cda792c1cf42df1
                  • Instruction ID: db3a641850abce508c8bd7d6506133f8faae009d33481823ffed029633f2f8ab
                  • Opcode Fuzzy Hash: 189aa2914e4c74a73f832e2b49fedffbe61148eb39aebf378cda792c1cf42df1
                  • Instruction Fuzzy Hash: 511156B2D003498FDB10DFA9C945BDEBBF5EF48324F24881AE919A7250C7759540DFA0
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 02985C45
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: f65c1482a8379891d7c6e63279e3564d05feb03f22a3ae77e5f5b53ca68f95c8
                  • Instruction ID: c433d630a5712d1dd48f7b18392d492afb09cde10d20bcc16740b0846a4856b5
                  • Opcode Fuzzy Hash: f65c1482a8379891d7c6e63279e3564d05feb03f22a3ae77e5f5b53ca68f95c8
                  • Instruction Fuzzy Hash: 771146B1800349CFCB10DF99DA85BEEBFF8EB08324F19844AD914A7201D374A948CFA0
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 02985C45
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918441663.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2980000_rRQnnfB.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 796be6a779c14066e94cd98526f191c67e9ec0fb94a102b5a7c203ea869f82a2
                  • Instruction ID: e532e7c65be68a9fadaf31c7a4a6ce5422519fd891341bfd2c4b32c09b413552
                  • Opcode Fuzzy Hash: 796be6a779c14066e94cd98526f191c67e9ec0fb94a102b5a7c203ea869f82a2
                  • Instruction Fuzzy Hash: 271122B58003499FDB10DF8AC985BDEBBF8EB48324F24841AE518A7200C375A944CFA1
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0281AFDE
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918321271.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_2810000_rRQnnfB.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 17a774dbc23d4bd9c6f3fdcc377f3e8ec7721e3dc3dca0c7eab2a945a56eebd4
                  • Instruction ID: c42c3c02796462c5736ecd9eadcfce8808c6c686c40e5abda20f41e567a3c7ee
                  • Opcode Fuzzy Hash: 17a774dbc23d4bd9c6f3fdcc377f3e8ec7721e3dc3dca0c7eab2a945a56eebd4
                  • Instruction Fuzzy Hash: 891110BAC003498FCB14CF9AD444ADEFBF8EF88328F10841AD428A7640C379A545CFA1
                  APIs
                  • CloseHandle.KERNELBASE(00000000), ref: 06CB7DC7
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID:
                  • API String ID: 2962429428-0
                  • Opcode ID: a753137ab55f4ce29fcf74f794279a4241d32036caf4c1d0a6f8c1ca8ded01d1
                  • Instruction ID: 39f2b04d5bba08436ad4a4346c00f6579c69c8871cb55b84a8ac79a51c8ab408
                  • Opcode Fuzzy Hash: a753137ab55f4ce29fcf74f794279a4241d32036caf4c1d0a6f8c1ca8ded01d1
                  • Instruction Fuzzy Hash: 171155B180024A8FDB10CFAAD545BEEFBF4EF48324F20846AD518A7251C378A944CFA1
                  APIs
                  • CloseHandle.KERNELBASE(00000000), ref: 06CB7DC7
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1924197651.0000000006CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_6cb0000_rRQnnfB.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID:
                  • API String ID: 2962429428-0
                  • Opcode ID: 74d945efce4b67ac3c3f6b5e6143afff2a4e142f9980e392c882ed903a905606
                  • Instruction ID: 1d9e7f99274cf5266c5e562ddc9bfcb2b49116128a0042ce3e1fb80057d7a329
                  • Opcode Fuzzy Hash: 74d945efce4b67ac3c3f6b5e6143afff2a4e142f9980e392c882ed903a905606
                  • Instruction Fuzzy Hash: F81116B18003498FDB10CF9AD545BEEBBF8EB48324F24846AD918A3240D778A944CFA5
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1917941639.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27bd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9ed5abb50cf9d6316b8c872d3842f8fc70634ac5c4ea0ab950583234ba980cd9
                  • Instruction ID: 6a9582fdd7b532b248737cb7c4c112deaaa814ad628a485eef1ee3f74bdd33a8
                  • Opcode Fuzzy Hash: 9ed5abb50cf9d6316b8c872d3842f8fc70634ac5c4ea0ab950583234ba980cd9
                  • Instruction Fuzzy Hash: 0721F1B2904280EFDB26DF14D9C4BA7BF65FF88314F24C569ED091A246C336D416CBA1
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1917941639.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27bd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 09077d12ed987ced41d2dc7d5979de10f269639d6002ed5221def839d2144b5a
                  • Instruction ID: b1cc5996fb74c1d7757e88a0033c82cf0503580f54bc52693d86c8c2609a0448
                  • Opcode Fuzzy Hash: 09077d12ed987ced41d2dc7d5979de10f269639d6002ed5221def839d2144b5a
                  • Instruction Fuzzy Hash: 6B2125B1504204DFDB2ADF14D9C0B66BF65FF88324F24C569ED0A4B256C33AE456CBA2
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918001999.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27cd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 24733d5c1350351452d71a0551b73f0a522834356f1639ddf378d80cf9e4c05a
                  • Instruction ID: 8833cf5ef8e761abf881d72d4c9f78dcf698e26d211e42ae7613c64a6c5009fe
                  • Opcode Fuzzy Hash: 24733d5c1350351452d71a0551b73f0a522834356f1639ddf378d80cf9e4c05a
                  • Instruction Fuzzy Hash: 5521F5B5604204DFDB24DF28D5C4B26BB65FB84324F34C57DD94A4B256C336D487CA61
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918001999.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27cd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a7d3d2fa773ee2285f0165762b5d438cf45bddbf43b42db42900130466a60db7
                  • Instruction ID: 41aa342753149a6c60b1200fe77d288040b7ea8812fac741530879750d36af37
                  • Opcode Fuzzy Hash: a7d3d2fa773ee2285f0165762b5d438cf45bddbf43b42db42900130466a60db7
                  • Instruction Fuzzy Hash: 1621F2B1504200EFDB25DF24D9C0B26BBA5FB88324F34C97DE94A4B25AC336D446CB61
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918001999.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27cd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a9406098c94afd6bb8d93564fa179edcc9eee33c7a512cbf1e6aaab20eccf26d
                  • Instruction ID: b1186ba5d8da66814c5a29aff225fdcaa1be8e105976e55f4605f9449307c44d
                  • Opcode Fuzzy Hash: a9406098c94afd6bb8d93564fa179edcc9eee33c7a512cbf1e6aaab20eccf26d
                  • Instruction Fuzzy Hash: D62180755093808FCB12CF24D590715BF71EB46314F28C5EED8498B6A7C33AD44ACB62
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1917941639.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27bd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0198dffcca54c8a327979ca184e18e1179e26769679eb7287e54d642110c921c
                  • Instruction ID: 1c429eef06d43606f47dd38e3c5e110f997bef4e3def63cea4a67243da136843
                  • Opcode Fuzzy Hash: 0198dffcca54c8a327979ca184e18e1179e26769679eb7287e54d642110c921c
                  • Instruction Fuzzy Hash: 9721CD76804280DFCB16CF00D9C4B96BF62FF88314F24C1A9EC080A656C33AD42ACBA1
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1917941639.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27bd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                  • Instruction ID: 1a765da26c50197a2b55241d02b42364dcbd33036f91f4c32fdc465b7bb44b82
                  • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                  • Instruction Fuzzy Hash: 2911DF72404240CFCB16CF00D5C4B56BF72FB84324F24C6A9DC090B656C33AE45ACBA2
                  Memory Dump Source
                  • Source File: 0000000D.00000002.1918001999.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_27cd000_rRQnnfB.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction ID: 6d598692442fe00c4d1374e0080efef08d43de090670ffb3141d3d8039f7cdf8
                  • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction Fuzzy Hash: 1A119075504240DFDB15CF24D5C4B16FB71FB84314F24C6AED8494B656C33AD44ACB51