Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
S1qgnlqr1V.exe

Overview

General Information

Sample name:S1qgnlqr1V.exe
renamed because original name is a hash value
Original sample name:10b98a933809918bfcdd9c1ea91edee6.exe
Analysis ID:1544356
MD5:10b98a933809918bfcdd9c1ea91edee6
SHA1:4e5f1555f8030aab3e98fe7ef31c8083ba9e32f2
SHA256:70494a9ed1d509c12c48aa4dc68f06f73bee77a18a625b576dd515e9f4e0d6c3
Tags:32exetrojan
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • S1qgnlqr1V.exe (PID: 6672 cmdline: "C:\Users\user\Desktop\S1qgnlqr1V.exe" MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
    • powershell.exe (PID: 6720 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • S1qgnlqr1V.exe (PID: 5880 cmdline: "C:\Users\user\Desktop\S1qgnlqr1V.exe" MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
      • schtasks.exe (PID: 7220 cmdline: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7296 cmdline: "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WerFault.exe (PID: 7868 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 1756 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • S1qgnlqr1V.exe (PID: 7348 cmdline: C:\Users\user\Desktop\S1qgnlqr1V.exe 0 MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
    • powershell.exe (PID: 7544 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7912 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • S1qgnlqr1V.exe (PID: 7560 cmdline: "C:\Users\user\Desktop\S1qgnlqr1V.exe" MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
  • dnshost.exe (PID: 7388 cmdline: "C:\Program Files (x86)\DNS Host\dnshost.exe" 0 MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
    • powershell.exe (PID: 7552 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dnshost.exe (PID: 7576 cmdline: "C:\Program Files (x86)\DNS Host\dnshost.exe" MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
  • dnshost.exe (PID: 8096 cmdline: "C:\Program Files (x86)\DNS Host\dnshost.exe" MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
    • dnshost.exe (PID: 8140 cmdline: "C:\Program Files (x86)\DNS Host\dnshost.exe" MD5: 10B98A933809918BFCDD9C1EA91EDEE6)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "a376f716-2f77-4943-a431-3a3bcb53", "Group": "CAT", "Domain1": "66.63.187.113", "Domain2": "66.63.187.113", "Port": 1664, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0x1a3fe:$b5: GetBlockHash
    • 0x124fe:$b6: AddHostEntry
    • 0x161f1:$b7: LogClientException
    • 0x1246b:$b8: PipeExists
    • 0xffb7:$b9: IClientLoggingHost
    00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocoredetect Nanocore in memoryJPCERT/CC Incident Response Group
    • 0xfcf5:$v1: NanoCore Client
    • 0xfd05:$v1: NanoCore Client
    • 0x115c6:$v2: PluginCommand
    • 0x115ae:$v3: CommandType
    Click to see the 73 entries
    SourceRuleDescriptionAuthorStrings
    4.2.S1qgnlqr1V.exe.5570000.3.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xe75:$a1: NanoCore.ClientPluginHost
    • 0xe38:$a2: NanoCore.ClientPlugin
    • 0x120c:$b1: get_BuilderSettings
    • 0xec3:$b4: IClientAppHost
    • 0x127d:$b6: AddHostEntry
    • 0x12ec:$b7: LogClientException
    • 0x1261:$b8: PipeExists
    • 0xeb0:$b9: IClientLoggingHost
    4.2.S1qgnlqr1V.exe.5570000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    4.2.S1qgnlqr1V.exe.5570000.3.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xe38:$x2: NanoCore.ClientPlugin
    • 0xe75:$x3: NanoCore.ClientPluginHost
    • 0xe5a:$i1: IClientApp
    • 0xe4e:$i2: IClientData
    • 0xe29:$i3: IClientNetwork
    • 0xec3:$i4: IClientAppHost
    • 0xe65:$i5: IClientDataHost
    • 0xeb0:$i6: IClientLoggingHost
    • 0xe8f:$i7: IClientNetworkHost
    • 0xea2:$i8: IClientUIHost
    • 0xed2:$i9: IClientNameObjectCollection
    • 0xef7:$i10: IClientReadOnlyNameObjectCollection
    • 0xe41:$s1: ClientPlugin
    • 0x177c:$s1: ClientPlugin
    • 0x1789:$s1: ClientPlugin
    • 0x11f9:$s6: get_ClientSettings
    • 0x1249:$s7: get_Connected
    4.2.S1qgnlqr1V.exe.5584629.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      4.2.S1qgnlqr1V.exe.5584629.4.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xb184:$a1: NanoCore.ClientPluginHost
      • 0xb14f:$a2: NanoCore.ClientPlugin
      • 0x100ca:$b1: get_BuilderSettings
      • 0x10039:$b7: LogClientException
      • 0xb19e:$b9: IClientLoggingHost
      Click to see the 138 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\S1qgnlqr1V.exe, ProcessId: 5880, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\S1qgnlqr1V.exe, ProcessId: 5880, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\S1qgnlqr1V.exe", ParentImage: C:\Users\user\Desktop\S1qgnlqr1V.exe, ParentProcessId: 6672, ParentProcessName: S1qgnlqr1V.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", ProcessId: 6720, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\S1qgnlqr1V.exe", ParentImage: C:\Users\user\Desktop\S1qgnlqr1V.exe, ParentProcessId: 6672, ParentProcessName: S1qgnlqr1V.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", ProcessId: 6720, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp", CommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\S1qgnlqr1V.exe", ParentImage: C:\Users\user\Desktop\S1qgnlqr1V.exe, ParentProcessId: 5880, ParentProcessName: S1qgnlqr1V.exe, ProcessCommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp", ProcessId: 7220, ProcessName: schtasks.exe
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Program Files (x86)\DNS Host\dnshost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\S1qgnlqr1V.exe, ProcessId: 5880, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DNS Host
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\S1qgnlqr1V.exe", ParentImage: C:\Users\user\Desktop\S1qgnlqr1V.exe, ParentProcessId: 6672, ParentProcessName: S1qgnlqr1V.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe", ProcessId: 6720, ProcessName: powershell.exe

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp", CommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\S1qgnlqr1V.exe", ParentImage: C:\Users\user\Desktop\S1qgnlqr1V.exe, ParentProcessId: 5880, ParentProcessName: S1qgnlqr1V.exe, ProcessCommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp", ProcessId: 7220, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\S1qgnlqr1V.exe, ProcessId: 5880, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\S1qgnlqr1V.exe, ProcessId: 5880, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-29T10:16:10.554958+010020469141Malware Command and Control Activity Detected192.168.2.54970766.63.187.1131664TCP
      2024-10-29T10:16:11.750584+010020469141Malware Command and Control Activity Detected192.168.2.54970766.63.187.1131664TCP
      2024-10-29T10:16:18.257728+010020469141Malware Command and Control Activity Detected192.168.2.54971066.63.187.1131664TCP
      2024-10-29T10:16:23.323327+010020469141Malware Command and Control Activity Detected192.168.2.54971366.63.187.1131664TCP
      2024-10-29T10:16:24.335696+010020469141Malware Command and Control Activity Detected192.168.2.54971366.63.187.1131664TCP
      2024-10-29T10:16:30.382597+010020469141Malware Command and Control Activity Detected192.168.2.54973966.63.187.1131664TCP
      2024-10-29T10:16:36.413853+010020469141Malware Command and Control Activity Detected192.168.2.54974066.63.187.1131664TCP
      2024-10-29T10:16:42.516764+010020469141Malware Command and Control Activity Detected192.168.2.54974166.63.187.1131664TCP
      2024-10-29T10:16:48.461018+010020469141Malware Command and Control Activity Detected192.168.2.54974266.63.187.1131664TCP
      2024-10-29T10:16:54.460917+010020469141Malware Command and Control Activity Detected192.168.2.54974366.63.187.1131664TCP
      2024-10-29T10:17:00.576565+010020469141Malware Command and Control Activity Detected192.168.2.54974466.63.187.1131664TCP
      2024-10-29T10:17:01.527355+010020469141Malware Command and Control Activity Detected192.168.2.54974466.63.187.1131664TCP
      2024-10-29T10:17:06.570186+010020469141Malware Command and Control Activity Detected192.168.2.54974766.63.187.1131664TCP
      2024-10-29T10:17:07.570211+010020469141Malware Command and Control Activity Detected192.168.2.54974766.63.187.1131664TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-29T10:16:09.729406+010020250191Malware Command and Control Activity Detected192.168.2.54970766.63.187.1131664TCP
      2024-10-29T10:16:17.256270+010020250191Malware Command and Control Activity Detected192.168.2.54971066.63.187.1131664TCP
      2024-10-29T10:16:23.311064+010020250191Malware Command and Control Activity Detected192.168.2.54971366.63.187.1131664TCP
      2024-10-29T10:16:29.373432+010020250191Malware Command and Control Activity Detected192.168.2.54973966.63.187.1131664TCP
      2024-10-29T10:16:35.420574+010020250191Malware Command and Control Activity Detected192.168.2.54974066.63.187.1131664TCP
      2024-10-29T10:16:41.437149+010020250191Malware Command and Control Activity Detected192.168.2.54974166.63.187.1131664TCP
      2024-10-29T10:16:47.485030+010020250191Malware Command and Control Activity Detected192.168.2.54974266.63.187.1131664TCP
      2024-10-29T10:16:53.482988+010020250191Malware Command and Control Activity Detected192.168.2.54974366.63.187.1131664TCP
      2024-10-29T10:17:00.295826+010020250191Malware Command and Control Activity Detected192.168.2.54974466.63.187.1131664TCP
      2024-10-29T10:17:06.545067+010020250191Malware Command and Control Activity Detected192.168.2.54974766.63.187.1131664TCP
      2024-10-29T10:17:12.592280+010020250191Malware Command and Control Activity Detected192.168.2.54974866.63.187.1131664TCP
      2024-10-29T10:17:17.591967+010020250191Malware Command and Control Activity Detected192.168.2.54974966.63.187.1131664TCP
      2024-10-29T10:17:22.607610+010020250191Malware Command and Control Activity Detected192.168.2.54975066.63.187.1131664TCP
      2024-10-29T10:17:27.607589+010020250191Malware Command and Control Activity Detected192.168.2.54975166.63.187.1131664TCP
      2024-10-29T10:17:32.623493+010020250191Malware Command and Control Activity Detected192.168.2.54975266.63.187.1131664TCP
      2024-10-29T10:17:37.623598+010020250191Malware Command and Control Activity Detected192.168.2.54975366.63.187.1131664TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-29T10:16:10.554958+010028223261Malware Command and Control Activity Detected192.168.2.54970766.63.187.1131664TCP
      2024-10-29T10:16:11.750584+010028223261Malware Command and Control Activity Detected192.168.2.54970766.63.187.1131664TCP
      2024-10-29T10:16:18.257728+010028223261Malware Command and Control Activity Detected192.168.2.54971066.63.187.1131664TCP
      2024-10-29T10:16:23.323327+010028223261Malware Command and Control Activity Detected192.168.2.54971366.63.187.1131664TCP
      2024-10-29T10:16:24.335696+010028223261Malware Command and Control Activity Detected192.168.2.54971366.63.187.1131664TCP
      2024-10-29T10:16:30.382597+010028223261Malware Command and Control Activity Detected192.168.2.54973966.63.187.1131664TCP
      2024-10-29T10:16:36.413853+010028223261Malware Command and Control Activity Detected192.168.2.54974066.63.187.1131664TCP
      2024-10-29T10:16:42.516764+010028223261Malware Command and Control Activity Detected192.168.2.54974166.63.187.1131664TCP
      2024-10-29T10:16:48.461018+010028223261Malware Command and Control Activity Detected192.168.2.54974266.63.187.1131664TCP
      2024-10-29T10:16:54.460917+010028223261Malware Command and Control Activity Detected192.168.2.54974366.63.187.1131664TCP
      2024-10-29T10:17:00.576565+010028223261Malware Command and Control Activity Detected192.168.2.54974466.63.187.1131664TCP
      2024-10-29T10:17:01.527355+010028223261Malware Command and Control Activity Detected192.168.2.54974466.63.187.1131664TCP
      2024-10-29T10:17:06.570186+010028223261Malware Command and Control Activity Detected192.168.2.54974766.63.187.1131664TCP
      2024-10-29T10:17:07.570211+010028223261Malware Command and Control Activity Detected192.168.2.54974766.63.187.1131664TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-29T10:16:11.750584+010028167181A Network Trojan was detected192.168.2.54970766.63.187.1131664TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: S1qgnlqr1V.exeAvira: detected
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeAvira: detection malicious, Label: HEUR/AGEN.1305635
      Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "a376f716-2f77-4943-a431-3a3bcb53", "Group": "CAT", "Domain1": "66.63.187.113", "Domain2": "66.63.187.113", "Port": 1664, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeReversingLabs: Detection: 52%
      Source: S1qgnlqr1V.exeReversingLabs: Detection: 52%
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTR
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeJoe Sandbox ML: detected
      Source: S1qgnlqr1V.exeJoe Sandbox ML: detected
      Source: S1qgnlqr1V.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: S1qgnlqr1V.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: System.pdbh~ source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: Accessibility.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: rzUp.pdb source: S1qgnlqr1V.exe, dnshost.exe.4.dr
      Source: Binary string: System.ni.pdbRSDS source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.pdb` source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.pdbMZ source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: mscorlib.ni.pdbRSDS source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.ni.pdbRSDS# source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: Microsoft.VisualBasic.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Windows.Forms.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: mscorlib.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.pdb8 source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Windows.Forms.pdbp source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Drawing.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: mscorlib.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERC346.tmp.dmp.25.dr
      Source: Binary string: rzUp.pdbSHA256 source: S1qgnlqr1V.exe, dnshost.exe.4.dr
      Source: Binary string: System.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.ni.pdbRSDS source: WERC346.tmp.dmp.25.dr

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49713 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49713 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49710 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49710 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49707 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49739 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49707 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49741 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49741 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49739 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49742 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49742 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49743 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49743 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49740 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49740 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49744 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.5:49747 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49744 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.5:49747 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2816718 - Severity 1 - ETPRO MALWARE NanoCore RAT Keep-Alive Beacon : 192.168.2.5:49707 -> 66.63.187.113:1664
      Source: Malware configuration extractorURLs: 66.63.187.113
      Source: global trafficTCP traffic: 192.168.2.5:49707 -> 66.63.187.113:1664
      Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49707 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49713 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49710 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49739 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49741 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49742 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49740 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49743 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49744 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49747 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49749 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49748 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49753 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49750 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49751 -> 66.63.187.113:1664
      Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.5:49752 -> 66.63.187.113:1664
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.113
      Source: S1qgnlqr1V.exe, 00000000.00000002.2080996073.0000000002B90000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 0000000A.00000002.2135969780.0000000003332000.00000004.00000800.00020000.00000000.sdmp, dnshost.exe, 0000000B.00000002.2149555917.0000000002372000.00000004.00000800.00020000.00000000.sdmp, dnshost.exe, 00000013.00000002.2223301091.0000000002AB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Amcache.hve.25.drString found in binary or memory: http://upx.sf.net
      Source: S1qgnlqr1V.exe, 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_3e37a762-f

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTR

      System Summary

      barindex
      Source: 4.2.S1qgnlqr1V.exe.5570000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4.2.S1qgnlqr1V.exe.5570000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.S1qgnlqr1V.exe.5570000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 16.2.dnshost.exe.330a2b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 16.2.dnshost.exe.330a2b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.dnshost.exe.330a2b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.S1qgnlqr1V.exe.333a220.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.S1qgnlqr1V.exe.333a220.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 14.2.S1qgnlqr1V.exe.333a220.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 4.2.S1qgnlqr1V.exe.2c34aa8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4.2.S1qgnlqr1V.exe.2c34aa8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.S1qgnlqr1V.exe.2c34aa8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A2CA8 NtQueryInformationProcess,0_2_077A2CA8
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A2CA0 NtQueryInformationProcess,0_2_077A2CA0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_07642CA8 NtQueryInformationProcess,10_2_07642CA8
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_07642CA0 NtQueryInformationProcess,10_2_07642CA0
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E42CA8 NtQueryInformationProcess,19_2_06E42CA8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E42CA0 NtQueryInformationProcess,19_2_06E42CA0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_00C0DA8C0_2_00C0DA8C
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A00400_2_077A0040
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A57D80_2_077A57D8
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A57D70_2_077A57D7
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A66F00_2_077A66F0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A66E00_2_077A66E0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A25780_2_077A2578
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077AD5000_2_077AD500
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A001F0_2_077A001F
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A20B80_2_077A20B8
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A2E280_2_077A2E28
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077ADD700_2_077ADD70
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A1C700_2_077A1C70
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077AFA100_2_077AFA10
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A69790_2_077A6979
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077AD9380_2_077AD938
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077AD9280_2_077AD928
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_077A69880_2_077A6988
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_0CFE18A00_2_0CFE18A0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 0_2_0CFE39500_2_0CFE3950
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 4_2_0125D3444_2_0125D344
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0183DA8C10_2_0183DA8C
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_03211A3910_2_03211A39
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_032139C010_2_032139C0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764004010_2_07640040
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_076457CB10_2_076457CB
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_076457D810_2_076457D8
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764D62010_2_0764D620
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764D63010_2_0764D630
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_076466E010_2_076466E0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_076466F010_2_076466F0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764257810_2_07642578
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764D1E210_2_0764D1E2
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764000610_2_07640006
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_076420B810_2_076420B8
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_07642E2810_2_07642E28
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764DEA010_2_0764DEA0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_07641C7010_2_07641C70
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764FB4010_2_0764FB40
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764DA6810_2_0764DA68
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764697910_2_07646979
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764698810_2_07646988
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 11_2_02161A4811_2_02161A48
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 11_2_021639C011_2_021639C0
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 11_2_02161A3911_2_02161A39
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 11_2_0220DA8C11_2_0220DA8C
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 14_2_0153D34414_2_0153D344
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 16_2_0174D34416_2_0174D344
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_00EDDA8C19_2_00EDDA8C
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4004019_2_06E40040
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E466E019_2_06E466E0
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E466F019_2_06E466F0
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E457C919_2_06E457C9
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E457D819_2_06E457D8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4257819_2_06E42578
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4D50019_2_06E4D500
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4D0C819_2_06E4D0C8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E420B819_2_06E420B8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4001F19_2_06E4001F
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E42E2819_2_06E42E28
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E41C8019_2_06E41C80
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4DD7019_2_06E4DD70
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4FA1019_2_06E4FA10
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4698819_2_06E46988
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4697919_2_06E46979
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4D92819_2_06E4D928
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_06E4D93819_2_06E4D938
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_070F367019_2_070F3670
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_070F15C819_2_070F15C8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 19_2_070F15B819_2_070F15B8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_016CD34420_2_016CD344
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_0579197820_2_05791978
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_057960C820_2_057960C8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_057971A020_2_057971A0
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_057970E820_2_057970E8
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_057960B720_2_057960B7
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 1756
      Source: S1qgnlqr1V.exe, 00000000.00000000.2068245397.00000000005A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerzUp.exe6 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000000.00000002.2098014593.0000000009F60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000000.00000002.2079523228.0000000000CBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000000.00000002.2095997755.00000000076B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000004.00000002.3625707954.0000000005790000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000004.00000002.3622066100.0000000003C81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exe, 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exeBinary or memory string: OriginalFilenamerzUp.exe6 vs S1qgnlqr1V.exe
      Source: S1qgnlqr1V.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 4.2.S1qgnlqr1V.exe.5570000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 4.2.S1qgnlqr1V.exe.5570000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.S1qgnlqr1V.exe.5570000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 16.2.dnshost.exe.330a2b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 16.2.dnshost.exe.330a2b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.dnshost.exe.330a2b8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.S1qgnlqr1V.exe.333a220.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.S1qgnlqr1V.exe.333a220.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 14.2.S1qgnlqr1V.exe.333a220.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 4.2.S1qgnlqr1V.exe.2c34aa8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 4.2.S1qgnlqr1V.exe.2c34aa8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.S1qgnlqr1V.exe.2c34aa8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
      Source: S1qgnlqr1V.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: dnshost.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qVxXNKnhAcArgJoGGYXiyyQ--.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qVxXNKnhAcArgJoGGYXiyyQ--.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qjIje6jGWLd2EOkfZXKqBbg--.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, K2JUEsV8vEGAd8d4vV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, K2JUEsV8vEGAd8d4vV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, K2JUEsV8vEGAd8d4vV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: _0020.AddAccessRule
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qjIje6jGWLd2EOkfZXKqBbg--.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qjIje6jGWLd2EOkfZXKqBbg--.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: _0020.AddAccessRule
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csSecurity API names: _0020.AddAccessRule
      Source: classification engineClassification label: mal100.troj.evad.winEXE@29/27@0/1
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile created: C:\Program Files (x86)\DNS HostJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\S1qgnlqr1V.exe.logJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7568:120:WilError_03
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5880
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7240:120:WilError_03
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{a376f716-2f77-4943-a431-3a3bcb53b7c0}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7304:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:764:120:WilError_03
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ew4cfgm.cmq.ps1Jump to behavior
      Source: S1qgnlqr1V.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: S1qgnlqr1V.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: S1qgnlqr1V.exeReversingLabs: Detection: 52%
      Source: S1qgnlqr1V.exeString found in binary or memory: $8ef8c825-4d3b-4232-add3-f59032e3b409
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile read: C:\Users\user\Desktop\S1qgnlqr1V.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp"
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe C:\Users\user\Desktop\S1qgnlqr1V.exe 0
      Source: unknownProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe" 0
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
      Source: unknownProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 1756
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: slc.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: mscoree.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: kernel.appcore.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: version.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: windows.storage.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: wldp.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: profapi.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptsp.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: rsaenh.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeSection loaded: cryptbase.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: mscoree.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: kernel.appcore.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: version.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: uxtheme.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.storage.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wldp.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: profapi.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptsp.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: rsaenh.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: mscoree.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: kernel.appcore.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: version.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: uxtheme.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.storage.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wldp.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: profapi.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptsp.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: rsaenh.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptbase.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: dwrite.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: amsi.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: userenv.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: msasn1.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: gpapi.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windowscodecs.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: mscoree.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: kernel.appcore.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: version.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: uxtheme.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.storage.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wldp.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: profapi.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptsp.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: rsaenh.dll
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptbase.dll
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: S1qgnlqr1V.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: S1qgnlqr1V.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: S1qgnlqr1V.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: System.pdbh~ source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: Accessibility.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: rzUp.pdb source: S1qgnlqr1V.exe, dnshost.exe.4.dr
      Source: Binary string: System.ni.pdbRSDS source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.pdb` source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.pdbMZ source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: mscorlib.ni.pdbRSDS source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Xml.ni.pdbRSDS# source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: Microsoft.VisualBasic.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Windows.Forms.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: mscorlib.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.pdb8 source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Windows.Forms.pdbp source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Drawing.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: mscorlib.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERC346.tmp.dmp.25.dr
      Source: Binary string: rzUp.pdbSHA256 source: S1qgnlqr1V.exe, dnshost.exe.4.dr
      Source: Binary string: System.ni.pdb source: WERC346.tmp.dmp.25.dr
      Source: Binary string: System.Core.ni.pdbRSDS source: WERC346.tmp.dmp.25.dr

      Data Obfuscation

      barindex
      Source: S1qgnlqr1V.exe, frmMain.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
      Source: S1qgnlqr1V.exe, frmMain.cs.Net Code: InitializeComponent
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, H4CSQ1Nx2HfkRkLYUK.cs.Net Code: sGfJNrfpRu System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qjIje6jGWLd2EOkfZXKqBbg--.cs.Net Code: _0023_003Dqf3c4WtE_0024_0024thN5QyBMvo3u0lth2VF5hmfUsIv1r8yRkg_003D System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qjIje6jGWLd2EOkfZXKqBbg--.cs.Net Code: _0023_003Dq_FL69pQf17BUSAFbWYu1SStMAbdu_0024R1GJ8VY8UL5_EA_003D System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, --qxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecU-.cs.Net Code: _0023_003DqKU0J1fiP8KA33eFK1owekQ_003D_003D System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, H4CSQ1Nx2HfkRkLYUK.cs.Net Code: sGfJNrfpRu System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.3970b90.0.raw.unpack, Uo.cs.Net Code: _202A_202E_206E_206A_202B_206A_200E_200D_206F_200D_200C_200B_206E_202C_202B_200E_206A_202D_202A_202C_202E_206B_202C_202E_202D_206F_206C_200E_202D_206B_202D_206D_202A_200C_200C_200B_200C_202B_200D_202E_202E System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, H4CSQ1Nx2HfkRkLYUK.cs.Net Code: sGfJNrfpRu System.Reflection.Assembly.Load(byte[])
      Source: 0.2.S1qgnlqr1V.exe.5000000.4.raw.unpack, Uo.cs.Net Code: _202A_202E_206E_206A_202B_206A_200E_200D_206F_200D_200C_200B_206E_202C_202B_200E_206A_202D_202A_202C_202E_206B_202C_202E_202D_206F_206C_200E_202D_206B_202D_206D_202A_200C_200C_200B_200C_202B_200D_202E_202E System.Reflection.Assembly.Load(byte[])
      Source: dnshost.exe.4.dr, frmMain.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
      Source: dnshost.exe.4.dr, frmMain.cs.Net Code: InitializeComponent
      Source: S1qgnlqr1V.exeStatic PE information: 0xF36C4B0A [Mon Jun 1 01:29:46 2099 UTC]
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeCode function: 10_2_0764B530 push es; retf 10_2_0764B580
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 20_2_057990FD push FFFFFF8Bh; iretd 20_2_057990FF
      Source: S1qgnlqr1V.exeStatic PE information: section name: .text entropy: 7.976488521718555
      Source: dnshost.exe.4.drStatic PE information: section name: .text entropy: 7.976488521718555
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, tfsLtBnipv4hjQkwWK.csHigh entropy of concatenated method names: 'rCpLes1iVi', 'ncfLcpqIr3', 'fnyL85E5FL', 'xbqLST7r6k', 'WesLiAByY4', 'ppELXgZP6U', 'zbgLt9Kgfn', 'ShCL4EEJeL', 'JOPLqaGnws', 'wLtLEguynW'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, K2JUEsV8vEGAd8d4vV.csHigh entropy of concatenated method names: 'Tkccyt0iyW', 'i9Ec1t1cf3', 'm6VcspIcMn', 'IxMcIkD6Nl', 'r2Gc6Zw7U0', 'qcocnY10d3', 'xUQcvWHDBt', 'f8bcAORJVI', 'Bw7cklQ3G2', 'qAgcm4kIQ7'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, mbDLx2M4muMvkqtp0T.csHigh entropy of concatenated method names: 'HYXL0mEjjC', 'bnxLHflyPp', 'mxoLwwkJCD', 'S9NLRrmY9q', 'rPdLyA7Wtl', 'Ae7Ljp8CPx', 'Next', 'Next', 'Next', 'NextBytes'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, dk2PC9FUOX5R5DVll3.csHigh entropy of concatenated method names: 'uP5324d5fu', 'tkC3gaBMyJ', 'V0M30h5swr', 'S9f3HQ3Q8D', 'GEx3REHgC4', 'fXT3jRuU4F', 'XGc3QIqj3c', 'wQF3r8NtUi', 'XaN3YG6ixi', 'cSW3Cck6QZ'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, kud2GY2KVaXnwhbOGk.csHigh entropy of concatenated method names: 'ToString', 'RClWCJhpo8', 'b2LWHihRb9', 'hCYWwx4VIT', 'RF2WRxLHLm', 'CZrWjZKxRL', 'OMgWTIi8kG', 'c5NWQdsTff', 'kNDWrEMAIn', 'LDCWfmVwlc'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, ojWe7AI1WluDtWcsWk.csHigh entropy of concatenated method names: 'y87Sdc2fiH', 'ghESbXkGBV', 'mqH8wvI4hu', 'ILv8RJnoKm', 'KIa8jMgv00', 'e9M8TVHyLm', 'T5w8QJoLe3', 'huQ8rn5m8p', 'Sh78fruyZY', 'eJY8YIIStY'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, TcYLxOSwmrtPThybOn.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'U5GpkZpFTv', 'DWHpmtHn4m', 'ANOpzhJr2V', 'cUJVarGa7h', 'xfbV5wojhB', 't6eVpmbls7', 'MOtVVh6Bl6', 'C8NDM8CKGYoGkYZN4Wn'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, knxd5wjEF9X4i9DapQ.csHigh entropy of concatenated method names: 'iufiOUb1RS', 'Gn2icWS0oR', 'FdGiSUR5LF', 'vvUiX1mt5W', 'GgyitMBbmk', 'eT2S6WFbIy', 'UTjSn1yRRu', 'A9nSvYRrg1', 'jUySANwj1T', 'uWYSkVeMki'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, ENMPCHbhAhKW3pvi0f.csHigh entropy of concatenated method names: 'Dispose', 'QCG5k49nTA', 'x6DpHopXwV', 'iixFFFOBEp', 'mxx5m3ZeBX', 'qIH5zVls6n', 'ProcessDialogKey', 'BqYpay67tM', 'ttyp5AUoI9', 'CnhppoktPa'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, jX2CVEl3uFgvd1jOmA.csHigh entropy of concatenated method names: 'cYa5XEQ60U', 'NAF5tbIVm5', 'U4M5q9cPc5', 'GlU5E2OaeY', 'uAN5hlo592', 'ScO5WCamHY', 'vr0p6Gd6ZvJWLmmjok', 'AIJCDycRUdISyNggdl', 'gHZ55me4wM', 'rMX5V5J7xA'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, BPKnnDffFa2YjtZVLG.csHigh entropy of concatenated method names: 'd1qXZ7grhY', 'QrsXlhOxh0', 'KIqXNq9Y5m', 'FwkXouP7ng', 'iXWXdYxFdY', 'QI3XKwsTE7', 'u5NXbCYiZh', 'HT8X2yYVeL', 'kHvXgGhVvO', 'DXSX74y1oL'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csHigh entropy of concatenated method names: 'T2KVOZbL50', 'cOeVevgKTn', 'bu2VcgFAAZ', 'KArV8LNvA9', 'A94VSUYdnA', 'DboViLsJMT', 'NP8VX3YPCF', 'nlkVtT8OuV', 'QSeV4TxUlm', 'kwxVq1gqeI'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, MeayWckdWGgmOsBXYw.csHigh entropy of concatenated method names: 'bdiCjHW3WsrBmhBZlek', 'bQVvJKWDjZTEMMMOpUa', 'ckfiL987dw', 'X92i95rYgo', 'D8jiuiZNYd', 'hvFrSlW70ThyvFkGnp3', 'DQbYptWUX8VKAUA1wnQ'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, bYNHCU7QUk9nHbKvNn.csHigh entropy of concatenated method names: 'LHlhYfoPem', 'RcmhB9qtei', 'UiyhyqoqXX', 'eGSh18eo5D', 'NaFhH5E4lP', 'uK4hwN83cG', 's2PhROQy7U', 'HBEhj2AA6s', 'hyyhTMWopk', 'iOThQmL8qC'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, kb5pD3tMfSNaKoT475.csHigh entropy of concatenated method names: 'Tx9NJNW8A', 'gC8oBi0HG', 'X2wKvF4gZ', 'KYVblNspQ', 'DsRgvPMY5', 'eH07JNxX2', 'nqWhq5rbrnJ2S3ay5M', 'SRNeZaRgdNtD7evR1g', 'VKHLIdNGu', 'bcWuJYITB'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, hFWeYe6lVJGfrJbyXJ.csHigh entropy of concatenated method names: 'rZEDAZqJcX', 'ybpDmfePvI', 'mfJLaBeNMv', 'X2hL5oF1Hk', 'WEEDCOVH0s', 'z0oDBGnSl3', 'rc8DUUr3i5', 'ccWDyWBuqR', 'MCGD114tVU', 'wXBDsn5XkA'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, QJBxB9idte0niQEnqXO.csHigh entropy of concatenated method names: 'H0W9Z7bkUx', 'qF79lkK1IA', 'JwB9N1xWGc', 'FcD9oa9HQW', 'wIF9dhph6H', 'K9u9K3rnas', 'jtA9bmBvP8', 'YbI928JX6I', 'UaN9gjPW5g', 'KBs97NAEI7'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, lZWXKMBwXHDXteLcFe.csHigh entropy of concatenated method names: 'pEaXeSckWZ', 'oWuX8ENa5m', 'k5bXi61yeX', 'QuAimb73ov', 'pSPizAD1ZU', 'pYRXas6oIi', 'bYjX5dLs7T', 'c4DXprBbfm', 'cYuXVRe93O', 'N6JXJS0itW'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, RGm6Xkv8Ze1P2qvYYe.csHigh entropy of concatenated method names: 'JL78oKuRjO', 'nLf8Kl8OFK', 'I4L82V34He', 'mg38giO1cP', 'u4a8h5IwAO', 'EL48WIXjHo', 'Qak8DecFU5', 'XHt8L7NiME', 'oNE89veURC', 'cZa8u9TmCq'
      Source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, l4TJewwOvHe5WqvLHB.csHigh entropy of concatenated method names: 'mSH95fR2FF', 'oGk9Vn1D94', 'hUO9JVdEVF', 'hDx9elJjQB', 'ISy9ciKeth', 'Tke9S73KDd', 'wUQ9ig5YVG', 'SkxLvOETIF', 'Dr0LAXi0LR', 'NrSLkJgaXD'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, tfsLtBnipv4hjQkwWK.csHigh entropy of concatenated method names: 'rCpLes1iVi', 'ncfLcpqIr3', 'fnyL85E5FL', 'xbqLST7r6k', 'WesLiAByY4', 'ppELXgZP6U', 'zbgLt9Kgfn', 'ShCL4EEJeL', 'JOPLqaGnws', 'wLtLEguynW'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, K2JUEsV8vEGAd8d4vV.csHigh entropy of concatenated method names: 'Tkccyt0iyW', 'i9Ec1t1cf3', 'm6VcspIcMn', 'IxMcIkD6Nl', 'r2Gc6Zw7U0', 'qcocnY10d3', 'xUQcvWHDBt', 'f8bcAORJVI', 'Bw7cklQ3G2', 'qAgcm4kIQ7'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, mbDLx2M4muMvkqtp0T.csHigh entropy of concatenated method names: 'HYXL0mEjjC', 'bnxLHflyPp', 'mxoLwwkJCD', 'S9NLRrmY9q', 'rPdLyA7Wtl', 'Ae7Ljp8CPx', 'Next', 'Next', 'Next', 'NextBytes'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, dk2PC9FUOX5R5DVll3.csHigh entropy of concatenated method names: 'uP5324d5fu', 'tkC3gaBMyJ', 'V0M30h5swr', 'S9f3HQ3Q8D', 'GEx3REHgC4', 'fXT3jRuU4F', 'XGc3QIqj3c', 'wQF3r8NtUi', 'XaN3YG6ixi', 'cSW3Cck6QZ'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, kud2GY2KVaXnwhbOGk.csHigh entropy of concatenated method names: 'ToString', 'RClWCJhpo8', 'b2LWHihRb9', 'hCYWwx4VIT', 'RF2WRxLHLm', 'CZrWjZKxRL', 'OMgWTIi8kG', 'c5NWQdsTff', 'kNDWrEMAIn', 'LDCWfmVwlc'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, ojWe7AI1WluDtWcsWk.csHigh entropy of concatenated method names: 'y87Sdc2fiH', 'ghESbXkGBV', 'mqH8wvI4hu', 'ILv8RJnoKm', 'KIa8jMgv00', 'e9M8TVHyLm', 'T5w8QJoLe3', 'huQ8rn5m8p', 'Sh78fruyZY', 'eJY8YIIStY'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, TcYLxOSwmrtPThybOn.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'U5GpkZpFTv', 'DWHpmtHn4m', 'ANOpzhJr2V', 'cUJVarGa7h', 'xfbV5wojhB', 't6eVpmbls7', 'MOtVVh6Bl6', 'C8NDM8CKGYoGkYZN4Wn'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, knxd5wjEF9X4i9DapQ.csHigh entropy of concatenated method names: 'iufiOUb1RS', 'Gn2icWS0oR', 'FdGiSUR5LF', 'vvUiX1mt5W', 'GgyitMBbmk', 'eT2S6WFbIy', 'UTjSn1yRRu', 'A9nSvYRrg1', 'jUySANwj1T', 'uWYSkVeMki'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, ENMPCHbhAhKW3pvi0f.csHigh entropy of concatenated method names: 'Dispose', 'QCG5k49nTA', 'x6DpHopXwV', 'iixFFFOBEp', 'mxx5m3ZeBX', 'qIH5zVls6n', 'ProcessDialogKey', 'BqYpay67tM', 'ttyp5AUoI9', 'CnhppoktPa'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, jX2CVEl3uFgvd1jOmA.csHigh entropy of concatenated method names: 'cYa5XEQ60U', 'NAF5tbIVm5', 'U4M5q9cPc5', 'GlU5E2OaeY', 'uAN5hlo592', 'ScO5WCamHY', 'vr0p6Gd6ZvJWLmmjok', 'AIJCDycRUdISyNggdl', 'gHZ55me4wM', 'rMX5V5J7xA'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, BPKnnDffFa2YjtZVLG.csHigh entropy of concatenated method names: 'd1qXZ7grhY', 'QrsXlhOxh0', 'KIqXNq9Y5m', 'FwkXouP7ng', 'iXWXdYxFdY', 'QI3XKwsTE7', 'u5NXbCYiZh', 'HT8X2yYVeL', 'kHvXgGhVvO', 'DXSX74y1oL'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csHigh entropy of concatenated method names: 'T2KVOZbL50', 'cOeVevgKTn', 'bu2VcgFAAZ', 'KArV8LNvA9', 'A94VSUYdnA', 'DboViLsJMT', 'NP8VX3YPCF', 'nlkVtT8OuV', 'QSeV4TxUlm', 'kwxVq1gqeI'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, MeayWckdWGgmOsBXYw.csHigh entropy of concatenated method names: 'bdiCjHW3WsrBmhBZlek', 'bQVvJKWDjZTEMMMOpUa', 'ckfiL987dw', 'X92i95rYgo', 'D8jiuiZNYd', 'hvFrSlW70ThyvFkGnp3', 'DQbYptWUX8VKAUA1wnQ'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, bYNHCU7QUk9nHbKvNn.csHigh entropy of concatenated method names: 'LHlhYfoPem', 'RcmhB9qtei', 'UiyhyqoqXX', 'eGSh18eo5D', 'NaFhH5E4lP', 'uK4hwN83cG', 's2PhROQy7U', 'HBEhj2AA6s', 'hyyhTMWopk', 'iOThQmL8qC'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, kb5pD3tMfSNaKoT475.csHigh entropy of concatenated method names: 'Tx9NJNW8A', 'gC8oBi0HG', 'X2wKvF4gZ', 'KYVblNspQ', 'DsRgvPMY5', 'eH07JNxX2', 'nqWhq5rbrnJ2S3ay5M', 'SRNeZaRgdNtD7evR1g', 'VKHLIdNGu', 'bcWuJYITB'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, hFWeYe6lVJGfrJbyXJ.csHigh entropy of concatenated method names: 'rZEDAZqJcX', 'ybpDmfePvI', 'mfJLaBeNMv', 'X2hL5oF1Hk', 'WEEDCOVH0s', 'z0oDBGnSl3', 'rc8DUUr3i5', 'ccWDyWBuqR', 'MCGD114tVU', 'wXBDsn5XkA'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, QJBxB9idte0niQEnqXO.csHigh entropy of concatenated method names: 'H0W9Z7bkUx', 'qF79lkK1IA', 'JwB9N1xWGc', 'FcD9oa9HQW', 'wIF9dhph6H', 'K9u9K3rnas', 'jtA9bmBvP8', 'YbI928JX6I', 'UaN9gjPW5g', 'KBs97NAEI7'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, lZWXKMBwXHDXteLcFe.csHigh entropy of concatenated method names: 'pEaXeSckWZ', 'oWuX8ENa5m', 'k5bXi61yeX', 'QuAimb73ov', 'pSPizAD1ZU', 'pYRXas6oIi', 'bYjX5dLs7T', 'c4DXprBbfm', 'cYuXVRe93O', 'N6JXJS0itW'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, RGm6Xkv8Ze1P2qvYYe.csHigh entropy of concatenated method names: 'JL78oKuRjO', 'nLf8Kl8OFK', 'I4L82V34He', 'mg38giO1cP', 'u4a8h5IwAO', 'EL48WIXjHo', 'Qak8DecFU5', 'XHt8L7NiME', 'oNE89veURC', 'cZa8u9TmCq'
      Source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, l4TJewwOvHe5WqvLHB.csHigh entropy of concatenated method names: 'mSH95fR2FF', 'oGk9Vn1D94', 'hUO9JVdEVF', 'hDx9elJjQB', 'ISy9ciKeth', 'Tke9S73KDd', 'wUQ9ig5YVG', 'SkxLvOETIF', 'Dr0LAXi0LR', 'NrSLkJgaXD'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, tfsLtBnipv4hjQkwWK.csHigh entropy of concatenated method names: 'rCpLes1iVi', 'ncfLcpqIr3', 'fnyL85E5FL', 'xbqLST7r6k', 'WesLiAByY4', 'ppELXgZP6U', 'zbgLt9Kgfn', 'ShCL4EEJeL', 'JOPLqaGnws', 'wLtLEguynW'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, K2JUEsV8vEGAd8d4vV.csHigh entropy of concatenated method names: 'Tkccyt0iyW', 'i9Ec1t1cf3', 'm6VcspIcMn', 'IxMcIkD6Nl', 'r2Gc6Zw7U0', 'qcocnY10d3', 'xUQcvWHDBt', 'f8bcAORJVI', 'Bw7cklQ3G2', 'qAgcm4kIQ7'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, mbDLx2M4muMvkqtp0T.csHigh entropy of concatenated method names: 'HYXL0mEjjC', 'bnxLHflyPp', 'mxoLwwkJCD', 'S9NLRrmY9q', 'rPdLyA7Wtl', 'Ae7Ljp8CPx', 'Next', 'Next', 'Next', 'NextBytes'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, dk2PC9FUOX5R5DVll3.csHigh entropy of concatenated method names: 'uP5324d5fu', 'tkC3gaBMyJ', 'V0M30h5swr', 'S9f3HQ3Q8D', 'GEx3REHgC4', 'fXT3jRuU4F', 'XGc3QIqj3c', 'wQF3r8NtUi', 'XaN3YG6ixi', 'cSW3Cck6QZ'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, kud2GY2KVaXnwhbOGk.csHigh entropy of concatenated method names: 'ToString', 'RClWCJhpo8', 'b2LWHihRb9', 'hCYWwx4VIT', 'RF2WRxLHLm', 'CZrWjZKxRL', 'OMgWTIi8kG', 'c5NWQdsTff', 'kNDWrEMAIn', 'LDCWfmVwlc'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, ojWe7AI1WluDtWcsWk.csHigh entropy of concatenated method names: 'y87Sdc2fiH', 'ghESbXkGBV', 'mqH8wvI4hu', 'ILv8RJnoKm', 'KIa8jMgv00', 'e9M8TVHyLm', 'T5w8QJoLe3', 'huQ8rn5m8p', 'Sh78fruyZY', 'eJY8YIIStY'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, TcYLxOSwmrtPThybOn.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'U5GpkZpFTv', 'DWHpmtHn4m', 'ANOpzhJr2V', 'cUJVarGa7h', 'xfbV5wojhB', 't6eVpmbls7', 'MOtVVh6Bl6', 'C8NDM8CKGYoGkYZN4Wn'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, knxd5wjEF9X4i9DapQ.csHigh entropy of concatenated method names: 'iufiOUb1RS', 'Gn2icWS0oR', 'FdGiSUR5LF', 'vvUiX1mt5W', 'GgyitMBbmk', 'eT2S6WFbIy', 'UTjSn1yRRu', 'A9nSvYRrg1', 'jUySANwj1T', 'uWYSkVeMki'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, ENMPCHbhAhKW3pvi0f.csHigh entropy of concatenated method names: 'Dispose', 'QCG5k49nTA', 'x6DpHopXwV', 'iixFFFOBEp', 'mxx5m3ZeBX', 'qIH5zVls6n', 'ProcessDialogKey', 'BqYpay67tM', 'ttyp5AUoI9', 'CnhppoktPa'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, jX2CVEl3uFgvd1jOmA.csHigh entropy of concatenated method names: 'cYa5XEQ60U', 'NAF5tbIVm5', 'U4M5q9cPc5', 'GlU5E2OaeY', 'uAN5hlo592', 'ScO5WCamHY', 'vr0p6Gd6ZvJWLmmjok', 'AIJCDycRUdISyNggdl', 'gHZ55me4wM', 'rMX5V5J7xA'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, BPKnnDffFa2YjtZVLG.csHigh entropy of concatenated method names: 'd1qXZ7grhY', 'QrsXlhOxh0', 'KIqXNq9Y5m', 'FwkXouP7ng', 'iXWXdYxFdY', 'QI3XKwsTE7', 'u5NXbCYiZh', 'HT8X2yYVeL', 'kHvXgGhVvO', 'DXSX74y1oL'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, H4CSQ1Nx2HfkRkLYUK.csHigh entropy of concatenated method names: 'T2KVOZbL50', 'cOeVevgKTn', 'bu2VcgFAAZ', 'KArV8LNvA9', 'A94VSUYdnA', 'DboViLsJMT', 'NP8VX3YPCF', 'nlkVtT8OuV', 'QSeV4TxUlm', 'kwxVq1gqeI'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, MeayWckdWGgmOsBXYw.csHigh entropy of concatenated method names: 'bdiCjHW3WsrBmhBZlek', 'bQVvJKWDjZTEMMMOpUa', 'ckfiL987dw', 'X92i95rYgo', 'D8jiuiZNYd', 'hvFrSlW70ThyvFkGnp3', 'DQbYptWUX8VKAUA1wnQ'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, bYNHCU7QUk9nHbKvNn.csHigh entropy of concatenated method names: 'LHlhYfoPem', 'RcmhB9qtei', 'UiyhyqoqXX', 'eGSh18eo5D', 'NaFhH5E4lP', 'uK4hwN83cG', 's2PhROQy7U', 'HBEhj2AA6s', 'hyyhTMWopk', 'iOThQmL8qC'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, kb5pD3tMfSNaKoT475.csHigh entropy of concatenated method names: 'Tx9NJNW8A', 'gC8oBi0HG', 'X2wKvF4gZ', 'KYVblNspQ', 'DsRgvPMY5', 'eH07JNxX2', 'nqWhq5rbrnJ2S3ay5M', 'SRNeZaRgdNtD7evR1g', 'VKHLIdNGu', 'bcWuJYITB'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, hFWeYe6lVJGfrJbyXJ.csHigh entropy of concatenated method names: 'rZEDAZqJcX', 'ybpDmfePvI', 'mfJLaBeNMv', 'X2hL5oF1Hk', 'WEEDCOVH0s', 'z0oDBGnSl3', 'rc8DUUr3i5', 'ccWDyWBuqR', 'MCGD114tVU', 'wXBDsn5XkA'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, QJBxB9idte0niQEnqXO.csHigh entropy of concatenated method names: 'H0W9Z7bkUx', 'qF79lkK1IA', 'JwB9N1xWGc', 'FcD9oa9HQW', 'wIF9dhph6H', 'K9u9K3rnas', 'jtA9bmBvP8', 'YbI928JX6I', 'UaN9gjPW5g', 'KBs97NAEI7'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, lZWXKMBwXHDXteLcFe.csHigh entropy of concatenated method names: 'pEaXeSckWZ', 'oWuX8ENa5m', 'k5bXi61yeX', 'QuAimb73ov', 'pSPizAD1ZU', 'pYRXas6oIi', 'bYjX5dLs7T', 'c4DXprBbfm', 'cYuXVRe93O', 'N6JXJS0itW'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, RGm6Xkv8Ze1P2qvYYe.csHigh entropy of concatenated method names: 'JL78oKuRjO', 'nLf8Kl8OFK', 'I4L82V34He', 'mg38giO1cP', 'u4a8h5IwAO', 'EL48WIXjHo', 'Qak8DecFU5', 'XHt8L7NiME', 'oNE89veURC', 'cZa8u9TmCq'
      Source: 0.2.S1qgnlqr1V.exe.9f60000.5.raw.unpack, l4TJewwOvHe5WqvLHB.csHigh entropy of concatenated method names: 'mSH95fR2FF', 'oGk9Vn1D94', 'hUO9JVdEVF', 'hDx9elJjQB', 'ISy9ciKeth', 'Tke9S73KDd', 'wUQ9ig5YVG', 'SkxLvOETIF', 'Dr0LAXi0LR', 'NrSLkJgaXD'
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile created: C:\Program Files (x86)\DNS Host\dnshost.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run DNS HostJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run DNS HostJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeFile opened: C:\Users\user\Desktop\S1qgnlqr1V.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTR
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: C00000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: FB0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 78F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 88F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 8AA0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 6AF0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 9FE0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: AFE0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: BFE0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 2C00000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 17F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 3300000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 3200000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 78F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 88F0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 8A80000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 9A80000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: A450000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: B450000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 2150000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 2340000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 2150000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 6BA0000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 7BA0000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 7D30000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 8D30000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 9660000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: A660000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 1530000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 32D0000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: 3220000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 1720000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 32A0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 52A0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: ED0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 2870000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 4870000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 7170000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 8170000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 8310000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 9310000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 9AC0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: AAC0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: BAC0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 16C0000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 3140000 memory reserve | memory write watch
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 5140000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4920Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1234Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeWindow / User API: threadDelayed 6372Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeWindow / User API: threadDelayed 3187Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeWindow / User API: foregroundWindowGot 1197Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4829
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6022
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exe TID: 6412Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep time: -2767011611056431s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exe TID: 7380Thread sleep time: -20291418481080494s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exe TID: 7408Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7812Thread sleep count: 4829 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7904Thread sleep time: -2767011611056431s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7788Thread sleep count: 223 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7860Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep count: 6022 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7908Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep count: 269 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exe TID: 7644Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DNS Host\dnshost.exe TID: 7668Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DNS Host\dnshost.exe TID: 8116Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DNS Host\dnshost.exe TID: 8176Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477
      Source: Amcache.hve.25.drBinary or memory string: VMware
      Source: S1qgnlqr1V.exe, 00000000.00000002.2079523228.0000000000CF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\X
      Source: Amcache.hve.25.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.25.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.25.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.25.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.25.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.25.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.25.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: dnshost.exe, 0000000B.00000002.2135782497.0000000000761000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: Amcache.hve.25.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.25.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.25.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.25.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: S1qgnlqr1V.exe, 00000004.00000002.3627593485.0000000006740000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: Amcache.hve.25.drBinary or memory string: vmci.sys
      Source: Amcache.hve.25.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
      Source: dnshost.exe, 0000000B.00000002.2135782497.0000000000761000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: Amcache.hve.25.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.25.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.25.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.25.drBinary or memory string: VMware20,1
      Source: Amcache.hve.25.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.25.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.25.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.25.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.25.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.25.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.25.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.25.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.25.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.25.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.25.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory written: C:\Users\user\Desktop\S1qgnlqr1V.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeMemory written: C:\Users\user\Desktop\S1qgnlqr1V.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory written: C:\Program Files (x86)\DNS Host\dnshost.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory written: C:\Program Files (x86)\DNS Host\dnshost.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeProcess created: C:\Users\user\Desktop\S1qgnlqr1V.exe "C:\Users\user\Desktop\S1qgnlqr1V.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"Jump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D63000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqLJ
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq0.
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqdc
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq0
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq4
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqlh
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqTP
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqtq
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq8
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.000000000313F000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager0
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq<
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.000000000311F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq$
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D63000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqlW
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000003173000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq(
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000003181000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4p
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqXA
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq,
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqU
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqT
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqX
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq`w
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq\
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqL[
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.000000000311F000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000003181000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq@
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.00000000031A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqTd
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq,=
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqH
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqpw
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq$,
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqL
      Source: S1qgnlqr1V.exe, 00000004.00000002.3628646108.000000000703D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager|
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqp
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqd#
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqt
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000003173000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqs
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqx
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq4k
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqp'
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq|.
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq|
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqp%
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq`
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq4c
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq@j
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqd
      Source: S1qgnlqr1V.exe, 00000004.00000002.3623292397.000000000517E000.00000004.00000010.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3628182909.0000000006DFD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerR
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqh
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjql
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqTx
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqD#
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqP0
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqd7
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqpE
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjqd0
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002F93000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerlBjq
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq,q
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRjq\!
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Users\user\Desktop\S1qgnlqr1V.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Users\user\Desktop\S1qgnlqr1V.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Users\user\Desktop\S1qgnlqr1V.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Program Files (x86)\DNS Host\dnshost.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformation
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Users\user\Desktop\S1qgnlqr1V.exe VolumeInformation
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Program Files (x86)\DNS Host\dnshost.exe VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Program Files (x86)\DNS Host\dnshost.exe VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Program Files (x86)\DNS Host\dnshost.exe VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DNS Host\dnshost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\S1qgnlqr1V.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.25.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.25.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.25.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.25.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: S1qgnlqr1V.exe, 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: S1qgnlqr1V.exe, 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: S1qgnlqr1V.exe, 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: S1qgnlqr1V.exe, 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: S1qgnlqr1V.exe, 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dnshost.exe, 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: S1qgnlqr1V.exe, 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: S1qgnlqr1V.exe, 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dnshost.exe, 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dnshost.exe, 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dnshost.exe, 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dnshost.exe, 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dnshost.exe, 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dnshost.exe, 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5584629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f4c45.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42eb7e6.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.44b9eb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.43dad70.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.S1qgnlqr1V.exe.5580000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.43d1270.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.dnshost.exe.42f061c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.S1qgnlqr1V.exe.4445890.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c8d9d0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.4366750.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c4d980.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 19.2.dnshost.exe.42f2130.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.dnshost.exe.3c5adb0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.S1qgnlqr1V.exe.4c1ad60.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 6672, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 5880, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7348, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7388, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: S1qgnlqr1V.exe PID: 7560, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 7576, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 8096, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      Scheduled Task/Job
      112
      Process Injection
      2
      Masquerading
      11
      Input Capture
      111
      Security Software Discovery
      Remote Services11
      Input Capture
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Scheduled Task/Job
      1
      Registry Run Keys / Startup Folder
      1
      Scheduled Task/Job
      11
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAt1
      DLL Side-Loading
      1
      Registry Run Keys / Startup Folder
      31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Remote Access Software
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture1
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Hidden Files and Directories
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
      Obfuscated Files or Information
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
      Software Packing
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      Timestomp
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
      DLL Side-Loading
      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1544356 Sample: S1qgnlqr1V.exe Startdate: 29/10/2024 Architecture: WINDOWS Score: 100 68 Suricata IDS alerts for network traffic 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 15 other signatures 2->74 8 S1qgnlqr1V.exe 4 2->8         started        12 S1qgnlqr1V.exe 3 2->12         started        14 dnshost.exe 4 2->14         started        16 dnshost.exe 2->16         started        process3 file4 64 C:\Users\user\AppData\...\S1qgnlqr1V.exe.log, ASCII 8->64 dropped 82 Detected Nanocore Rat 8->82 84 Uses schtasks.exe or at.exe to add and modify task schedules 8->84 86 Adds a directory exclusion to Windows Defender 8->86 18 S1qgnlqr1V.exe 1 13 8->18         started        23 powershell.exe 23 8->23         started        88 Injects a PE file into a foreign processes 12->88 25 powershell.exe 12->25         started        27 S1qgnlqr1V.exe 12->27         started        29 powershell.exe 14->29         started        31 dnshost.exe 14->31         started        33 dnshost.exe 16->33         started        signatures5 process6 dnsIp7 66 66.63.187.113, 1664, 49707, 49710 ASN-QUADRANET-GLOBALUS United States 18->66 54 C:\Program Files (x86)\DNS Host\dnshost.exe, PE32 18->54 dropped 56 C:\Users\user\AppData\Roaming\...\run.dat, data 18->56 dropped 58 C:\Users\user\AppData\Local\...\tmp5791.tmp, XML 18->58 dropped 60 C:\...\dnshost.exe:Zone.Identifier, ASCII 18->60 dropped 76 Detected Nanocore Rat 18->76 78 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->78 35 WerFault.exe 18->35         started        38 schtasks.exe 1 18->38         started        40 schtasks.exe 1 18->40         started        42 conhost.exe 23->42         started        80 Loading BitLocker PowerShell Module 25->80 44 conhost.exe 25->44         started        46 WmiPrvSE.exe 25->46         started        48 conhost.exe 29->48         started        file8 signatures9 process10 file11 62 C:\ProgramData\Microsoft\...\Report.wer, Unicode 35->62 dropped 50 conhost.exe 38->50         started        52 conhost.exe 40->52         started        process12

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      S1qgnlqr1V.exe53%ReversingLabsByteCode-MSIL.Trojan.SnakeLogger
      S1qgnlqr1V.exe100%AviraHEUR/AGEN.1305635
      S1qgnlqr1V.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DNS Host\dnshost.exe100%AviraHEUR/AGEN.1305635
      C:\Program Files (x86)\DNS Host\dnshost.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DNS Host\dnshost.exe53%ReversingLabsByteCode-MSIL.Trojan.SnakeLogger
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      66.63.187.113true
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netAmcache.hve.25.drfalse
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameS1qgnlqr1V.exe, 00000000.00000002.2080996073.0000000002B90000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, S1qgnlqr1V.exe, 0000000A.00000002.2135969780.0000000003332000.00000004.00000800.00020000.00000000.sdmp, dnshost.exe, 0000000B.00000002.2149555917.0000000002372000.00000004.00000800.00020000.00000000.sdmp, dnshost.exe, 00000013.00000002.2223301091.0000000002AB0000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        66.63.187.113
        unknownUnited States
        8100ASN-QUADRANET-GLOBALUStrue
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1544356
        Start date and time:2024-10-29 10:15:10 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 10m 37s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:27
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:S1qgnlqr1V.exe
        renamed because original name is a hash value
        Original Sample Name:10b98a933809918bfcdd9c1ea91edee6.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@29/27@0/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 179
        • Number of non-executed functions: 16
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.189.173.21
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtCreateKey calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: S1qgnlqr1V.exe
        TimeTypeDescription
        05:16:05API Interceptor164640x Sleep call for process: S1qgnlqr1V.exe modified
        05:16:07API Interceptor85x Sleep call for process: powershell.exe modified
        05:16:08API Interceptor2x Sleep call for process: dnshost.exe modified
        05:18:39API Interceptor1x Sleep call for process: WerFault.exe modified
        10:16:08Task SchedulerRun new task: DNS Host path: "C:\Users\user\Desktop\S1qgnlqr1V.exe" s>$(Arg0)
        10:16:08Task SchedulerRun new task: DNS Host Task path: "C:\Program Files (x86)\DNS Host\dnshost.exe" s>$(Arg0)
        10:16:10AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DNS Host C:\Program Files (x86)\DNS Host\dnshost.exe
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ASN-QUADRANET-GLOBALUSQuotation_PMV-1060_AVR1_PMV_1513_AVR1_PMV_1514_AVR1_PMV_1515.exeGet hashmaliciousGuLoader, StormKittyBrowse
        • 204.44.127.85
        splarm5.elfGet hashmaliciousUnknownBrowse
        • 190.9.40.179
        Master.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 141.98.197.31
        setup_office.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 141.98.197.31
        111.out.elfGet hashmaliciousUnknownBrowse
        • 141.98.197.31
        m68k.elfGet hashmaliciousMiraiBrowse
        • 45.199.228.213
        iQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
        • 104.129.55.104
        iQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
        • 104.129.55.104
        la.bot.sh4.elfGet hashmaliciousUnknownBrowse
        • 173.205.89.188
        Play_VM.Now.matt.sibilo_Audio.wav...v.htmlGet hashmaliciousHtmlDropperBrowse
        • 185.174.100.20
        No context
        No context
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Category:dropped
        Size (bytes):651264
        Entropy (8bit):7.969387672502693
        Encrypted:false
        SSDEEP:12288:sMfzumQeZXgZ2KsYEPpU0TET/BSqxTsJXVl+N84xXF7NPTZW:ssnlwQgEPpUOEdpdSVlD4xVJPTc
        MD5:10B98A933809918BFCDD9C1EA91EDEE6
        SHA1:4E5F1555F8030AAB3E98FE7EF31C8083BA9E32F2
        SHA-256:70494A9ED1D509C12C48AA4DC68F06F73BEE77A18A625B576DD515E9F4E0D6C3
        SHA-512:D5B735529DCC61CC92D2CA93A1B477F9E08901E903847AD68D9D63547C46F5D16F29DEB3E329A981068BE866167DF4EEECF2F14F30AE04501B327C6AFF6B2DAC
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 53%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Kl...............0.............&.... ... ....@.. .......................`............@.....................................O.... .. ....................@..........p............................................ ............... ..H............text...,.... ...................... ..`.rsrc... .... ......................@..@.reloc.......@......................@..B........................H.......`R...8......$........`.............................................}......}......}.....(.......(.....*...0...........sC.......{....o....o:......{....o....o<......{....o....o>......{....o....o@......{....o....oB..........o....r...p.o....o....(....r...p..0(....&.....+..*...........^e......&..(.....*...0.............{....o....rC..p(......,%.rE..pr...p..0(....&.{....o....&.....{....o....rC..p(......,%.r...pr...p..0(....&.{....o....&.K....{....o....(1........,%.r...pr/..p
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Preview:[ZoneTransfer]....ZoneId=0
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):1.1193519394028717
        Encrypted:false
        SSDEEP:192:wQDYXuFD0MLLHzKVa60+mVHmzuiFFZ24IO8/:RYeFwMHHuVaTDmzuiFFY4IO8/
        MD5:8C62ECBFF088EE9AAF5792C25104B673
        SHA1:D95EE7520DB33A8AE1AB309671181F94AEF8466F
        SHA-256:92847965BB3F9879D65DF4895796CE2EF81611B7E44D6A2BEB0352214FA5B176
        SHA-512:D3B58A3CEEB87847518B84891ADBA71BCA366E2AC54C73E2FFB84CD4D3266A399712B45ED16DD86E863474745246A7F051891B3FA741D331FF0761382AD473A6
        Malicious:true
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.6.7.0.5.9.8.6.6.4.1.5.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.6.7.1.0.1.6.3.2.0.2.6.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.6.b.8.f.9.3.c.-.6.7.4.0.-.4.b.2.3.-.8.9.2.a.-.7.c.4.1.7.6.4.3.1.c.0.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.6.1.7.3.6.f.-.3.4.e.b.-.4.6.8.a.-.9.2.7.4.-.c.3.f.7.3.2.4.d.c.0.5.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.1.q.g.n.l.q.r.1.V...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.r.z.U.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.f.8.-.0.0.0.1.-.0.0.1.4.-.a.9.2.2.-.0.6.2.f.e.3.2.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.7.f.4.a.6.d.4.a.c.d.d.a.4.7.7.a.6.b.0.b.b.6.5.f.d.6.8.9.4.9.6.0.0.0.0.0.0.0.0.!.0.0.0.0.4.e.5.f.1.5.5.5.f.8.0.3.0.a.a.b.3.e.9.8.f.e.7.e.f.3.1.c.8.0.8.3.b.a.9.e.3.2.f.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):6318
        Entropy (8bit):3.719704209352784
        Encrypted:false
        SSDEEP:192:R6l7wVeJ+f6HFYaJKMeKppD989b35sfodm:R6lXJG6lYaJKUW3Sfv
        MD5:52F6DECDC1FE46A973EECB3927BA0ED8
        SHA1:1D8FDD7AD42998B7E755BE9B84A7A6ACF93AE5D8
        SHA-256:316525D8926191E8DEABD34E19C35828BF897C178DFEBAC6599E96D5C2A0C095
        SHA-512:CEFE2520264AF8C37C1EA59C44C2E2E126F920D68516F401C93EAF21FFDDC03F2A8AEC8BC079AC474679D281857C4C96CA6975699C9573BE786213D79E31BC30
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.8.0.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4644
        Entropy (8bit):4.451976543402786
        Encrypted:false
        SSDEEP:48:cvIwWl8zs+iJg77aI9fsWpW8VYlYm8M4J19HNVFk+q8q9H3jSRI44VJAd:uIjf+wI7JF7VlJ7HiZHWRInVJAd
        MD5:D1642E09B0AE0C35BF42330C2C184D98
        SHA1:561061E25FC01AF19132785D0545C94FCCE8482C
        SHA-256:B6A79EBCA3914DBFB62A069A59473CEC7C103AC44C1453C0F4DFF46C1F481D28
        SHA-512:9C270952C21FC322B4B6F07487875F54DB73472DB26AE0EBEF50D026F4447B8FA6F36E9333E4841F217ACE9D8ACF5626AE98A216AD5F04920766AF559440E6D1
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="564501" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Tue Oct 29 09:18:21 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):1395189
        Entropy (8bit):4.794834619369641
        Encrypted:false
        SSDEEP:12288:E/cbWJP/VQfWvSQGb9JTqKliYjsUXJSHav9BdTe:E/thK+vScgBZgavLd
        MD5:BBD0AB186598C8AB6D557B41A35EC1CA
        SHA1:E8676202CE3ACC67A0FF650137B1E0C10FC9411D
        SHA-256:3C19CBBD14996664CF7978966F238823A1F06C3C162E2477DEE38F7CF0B1E816
        SHA-512:E67F96D7D72B64BBCBB8EFBB85492D82B8D62B4F6C45C96CAB5A24230C1700B6893610699E9408FF32E2DFEF6554FE30487AF14E73482B57FF9068722B2C1E00
        Malicious:false
        Preview:MDMP..a..... .......]. g............4...............H.......$...$&......./..tc..........`.......8...........T...........XD..............H&..........4(..............................................................................eJ.......(......GenuineIntel............T............ g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1216
        Entropy (8bit):5.34331486778365
        Encrypted:false
        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
        MD5:1330C80CAAC9A0FB172F202485E9B1E8
        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
        Malicious:true
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
        Process:C:\Program Files (x86)\DNS Host\dnshost.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1216
        Entropy (8bit):5.34331486778365
        Encrypted:false
        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
        MD5:1330C80CAAC9A0FB172F202485E9B1E8
        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
        Malicious:false
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):64
        Entropy (8bit):1.1510207563435464
        Encrypted:false
        SSDEEP:3:NlllulBkXj:NllUS
        MD5:453075887941F85A80949CDBA8D49A8B
        SHA1:7B31CA484A80AA32BCC06FC3511547BCB1413826
        SHA-256:84466098E76D1CF4D262F2CC01560C765FE842F8901EEE78B2F74609512737F8
        SHA-512:02E95B30978860CB5C83841B68C2E10EE56C9D8021DF34876CD33FD7F0C8B001C288F71FBBFF977DDF83031BD6CD86AC85688A6EFB6300D0221AA4A22ABE7659
        Malicious:false
        Preview:@...e................................................@..........
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1301
        Entropy (8bit):5.105927822674634
        Encrypted:false
        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Psxtn:cbk4oL600QydbQxIYODOLedq3Ssj
        MD5:ED4382E09E893D70919BF29B2E64629A
        SHA1:2EC538E1FE21292DBCF7AB2A8975C9BE0E1897C1
        SHA-256:CF997833A757EE0A2AFA321DDC21392EC18C800FCF723AC629268DD4CFEC9517
        SHA-512:6BDB80161107C2E3AC3E671F5C65D2143EA837137BE340407BD9C54B65DE8679E0C8C318226A572500372233EDD112C5AD3277B9DFD7B0B7A183368F8CFB27F5
        Malicious:true
        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1306
        Entropy (8bit):5.104451641222393
        Encrypted:false
        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R9lxtn:cbk4oL600QydbQxIYODOLedq3S9lj
        MD5:CFD32F0E8DBE9B358E7445116E8FC086
        SHA1:00D89923A223372FAC166743853397ABD974825B
        SHA-256:3662F5D5D156CFA337FF07F335FC9D34B46E66DB3A7A2CF69C820DD4BA273ADD
        SHA-512:A190E08EDA457DF3FA3C25AA4C1211DDB8377B2C04BB3B16110F5C0FF1E440A709A1FB6543357C8625C323A1BF4E52ECF74115C1382A6EC10BBA657F42DF5014
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:data
        Category:modified
        Size (bytes):232
        Entropy (8bit):7.089541637477408
        Encrypted:false
        SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
        MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
        SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
        SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
        SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
        Malicious:false
        Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:data
        Category:dropped
        Size (bytes):8
        Entropy (8bit):3.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:FBCB48D4D35E47AB9407449CC913E392
        SHA1:B739A2CE14E01D7849823CC21D3B4C603D69C229
        SHA-256:024DD6102C51F17B53C3FA35040C626B84DDBDD1988A141A2D33255D2A3514A2
        SHA-512:F498261F9141C6F3195D4A2B3FC2F62025C63A1E80F2E77A72EE290F9B3EC9B9574EB3CDCDD395BD9F61274A439931BF339DFE44A0C203C4B079F581DD5359F4
        Malicious:true
        Preview:...Q...H
        Process:C:\Users\user\Desktop\S1qgnlqr1V.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):38
        Entropy (8bit):4.300559092390956
        Encrypted:false
        SSDEEP:3:oNUWJRW2QLcUzLN:oNNJA2Q7
        MD5:CAD1EBC97007DB489530F47D2F5F946F
        SHA1:4B6C2002C3360118808243A23FAB180133B05BB7
        SHA-256:DD4D8F98C1265DD046EFE86FB7B5D400A76BCF022D12C915DFFC311F4BE84B27
        SHA-512:5006CC92DCE1A17B51AF1F629F718AD48F0792D302AC21BA1935A1CFF9B209F457753A8BDE0625B46138E4EF1866153C8FBF64F47764145458DAC58A446684B2
        Malicious:false
        Preview:C:\Users\user\Desktop\S1qgnlqr1V.exe
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.4217844620857045
        Encrypted:false
        SSDEEP:6144:1Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNV0uhiTw:8vloTMW+EZMM6DFy703w
        MD5:19741B3E1774CC2E86969B3089647D04
        SHA1:9271B11DEE1DD32F0C697B55D9385AC7C4F42393
        SHA-256:5ED8F031EC318A228F7A8063DB40F16F6BE3FB30EC9DEEB947FCACFE79A10FE3
        SHA-512:173D1CACD68C91C6201E2BE646331BD3EF0BBEF6B0B9EA6557F6065D3E26B6DA4ED02E815EC5420B0C22E5ED829A77931449BB4D9D10168394D86F30379A3F1F
        Malicious:false
        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...f.).................................................................................................................................................................................................................................................................................................................................................R........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.969387672502693
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:S1qgnlqr1V.exe
        File size:651'264 bytes
        MD5:10b98a933809918bfcdd9c1ea91edee6
        SHA1:4e5f1555f8030aab3e98fe7ef31c8083ba9e32f2
        SHA256:70494a9ed1d509c12c48aa4dc68f06f73bee77a18a625b576dd515e9f4e0d6c3
        SHA512:d5b735529dcc61cc92d2ca93a1b477f9e08901e903847ad68d9d63547c46f5d16f29deb3e329a981068be866167df4eeecf2f14f30ae04501b327c6aff6b2dac
        SSDEEP:12288:sMfzumQeZXgZ2KsYEPpU0TET/BSqxTsJXVl+N84xXF7NPTZW:ssnlwQgEPpUOEdpdSVlD4xVJPTc
        TLSH:38D4230133485F3BE1A99BB33C614AC19BF56A336962F118DDC470F56A17B8887C5E2B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Kl...............0.............&.... ... ....@.. .......................`............@................................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x4a0326
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xF36C4B0A [Mon Jun 1 01:29:46 2099 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xa02d20x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x620.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x9ebcc0x70.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x9e32c0x9e400c7871a557004d8b158fd28d1f068f40dFalse0.9737732030015798data7.976488521718555IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xa20000x6200x800d4cf237b89d0d99f1a92282752ad407cFalse0.3369140625data3.4595734708494343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0xa40000xc0x200024575860d97be1eabd008d50c4dada3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0xa20900x390data0.42653508771929827
        RT_MANIFEST0xa24300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
        2024-10-29T10:16:09.729406+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54970766.63.187.1131664TCP
        2024-10-29T10:16:10.554958+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54970766.63.187.1131664TCP
        2024-10-29T10:16:10.554958+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54970766.63.187.1131664TCP
        2024-10-29T10:16:11.750584+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54970766.63.187.1131664TCP
        2024-10-29T10:16:11.750584+01002816718ETPRO MALWARE NanoCore RAT Keep-Alive Beacon1192.168.2.54970766.63.187.1131664TCP
        2024-10-29T10:16:11.750584+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54970766.63.187.1131664TCP
        2024-10-29T10:16:17.256270+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54971066.63.187.1131664TCP
        2024-10-29T10:16:18.257728+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54971066.63.187.1131664TCP
        2024-10-29T10:16:18.257728+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54971066.63.187.1131664TCP
        2024-10-29T10:16:23.311064+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54971366.63.187.1131664TCP
        2024-10-29T10:16:23.323327+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54971366.63.187.1131664TCP
        2024-10-29T10:16:23.323327+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54971366.63.187.1131664TCP
        2024-10-29T10:16:24.335696+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54971366.63.187.1131664TCP
        2024-10-29T10:16:24.335696+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54971366.63.187.1131664TCP
        2024-10-29T10:16:29.373432+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54973966.63.187.1131664TCP
        2024-10-29T10:16:30.382597+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54973966.63.187.1131664TCP
        2024-10-29T10:16:30.382597+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54973966.63.187.1131664TCP
        2024-10-29T10:16:35.420574+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974066.63.187.1131664TCP
        2024-10-29T10:16:36.413853+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974066.63.187.1131664TCP
        2024-10-29T10:16:36.413853+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974066.63.187.1131664TCP
        2024-10-29T10:16:41.437149+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974166.63.187.1131664TCP
        2024-10-29T10:16:42.516764+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974166.63.187.1131664TCP
        2024-10-29T10:16:42.516764+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974166.63.187.1131664TCP
        2024-10-29T10:16:47.485030+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974266.63.187.1131664TCP
        2024-10-29T10:16:48.461018+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974266.63.187.1131664TCP
        2024-10-29T10:16:48.461018+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974266.63.187.1131664TCP
        2024-10-29T10:16:53.482988+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974366.63.187.1131664TCP
        2024-10-29T10:16:54.460917+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974366.63.187.1131664TCP
        2024-10-29T10:16:54.460917+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974366.63.187.1131664TCP
        2024-10-29T10:17:00.295826+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974466.63.187.1131664TCP
        2024-10-29T10:17:00.576565+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974466.63.187.1131664TCP
        2024-10-29T10:17:00.576565+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974466.63.187.1131664TCP
        2024-10-29T10:17:01.527355+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974466.63.187.1131664TCP
        2024-10-29T10:17:01.527355+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974466.63.187.1131664TCP
        2024-10-29T10:17:06.545067+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974766.63.187.1131664TCP
        2024-10-29T10:17:06.570186+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974766.63.187.1131664TCP
        2024-10-29T10:17:06.570186+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974766.63.187.1131664TCP
        2024-10-29T10:17:07.570211+01002046914ET MALWARE NanoCore RAT CnC 71192.168.2.54974766.63.187.1131664TCP
        2024-10-29T10:17:07.570211+01002822326ETPRO MALWARE NanoCore RAT CnC 191192.168.2.54974766.63.187.1131664TCP
        2024-10-29T10:17:12.592280+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974866.63.187.1131664TCP
        2024-10-29T10:17:17.591967+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54974966.63.187.1131664TCP
        2024-10-29T10:17:22.607610+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54975066.63.187.1131664TCP
        2024-10-29T10:17:27.607589+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54975166.63.187.1131664TCP
        2024-10-29T10:17:32.623493+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54975266.63.187.1131664TCP
        2024-10-29T10:17:37.623598+01002025019ET MALWARE Possible NanoCore C2 60B1192.168.2.54975366.63.187.1131664TCP
        TimestampSource PortDest PortSource IPDest IP
        Oct 29, 2024 10:16:09.709949970 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:09.715471029 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:09.715559959 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:09.729406118 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:09.734796047 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:10.554958105 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:10.560488939 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:10.677674055 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:10.680136919 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:10.685439110 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:10.981417894 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.028723001 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.034921885 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.040427923 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.396317005 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.396385908 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.396397114 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.396408081 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.396419048 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.396514893 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.396514893 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.576159954 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576204062 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576221943 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576240063 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576272964 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.576379061 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576394081 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576409101 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.576469898 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.576642036 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576659918 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576675892 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.576703072 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.577110052 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.577126980 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.577142954 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.577172995 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.577189922 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.750583887 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.756139994 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756177902 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756196022 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756211042 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756213903 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.756227970 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756244898 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756247044 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.756261110 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756278038 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756300926 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.756314993 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.756845951 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756944895 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756968021 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756984949 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.756999969 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.757015944 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.757025957 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.757066965 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.871665955 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.871915102 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.871936083 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.871958971 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.871964931 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.871999025 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.937315941 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937360048 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937390089 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937406063 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937421083 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937438965 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937443972 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.937457085 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.937479973 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.937494040 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.938124895 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.938141108 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.938157082 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.938170910 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.938222885 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.938699961 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.938774109 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.938817024 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:11.987332106 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.987358093 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.987380028 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:11.987410069 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.054862976 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.054903030 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.054923058 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.054932117 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.054959059 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.054963112 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.054986000 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.055032015 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.055043936 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.055063963 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.055095911 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.055116892 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.094172001 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.094229937 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.094230890 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.094254017 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.094300032 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.117095947 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.117120028 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.117141008 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.117163897 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.168555975 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168582916 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168610096 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.168652058 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168693066 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168700933 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.168714046 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168744087 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168764114 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168771029 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.168795109 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.168808937 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.209513903 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.209573030 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.209657907 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.209672928 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.209716082 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.233218908 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.233234882 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.233247995 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.233303070 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.284312963 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.284328938 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.284342051 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.284365892 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.284394979 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.284728050 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.284746885 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.284801960 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.285656929 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.285725117 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.285787106 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.285790920 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.296525002 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.296571970 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.296643019 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.324939966 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.324959040 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.324973106 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.325068951 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.325129986 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.349111080 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.349149942 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.349163055 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.349200964 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.399595022 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.399636030 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.399655104 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.399667978 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.399681091 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.399703026 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.399755001 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.400734901 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.400791883 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.400804043 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.400840044 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.412106991 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.412121058 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.412132978 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.412157059 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.412188053 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.440902948 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.440927029 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.440939903 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.440968990 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.464613914 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.464632034 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.464648962 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.464662075 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.464698076 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.515101910 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.515125036 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.515137911 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.515150070 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.515166998 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.515197992 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.515197992 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.516153097 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.516177893 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.516190052 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.516227961 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.516227961 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.528275013 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.528291941 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.528304100 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.528369904 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.556025982 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.556041956 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.556054115 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.556078911 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.556101084 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.579922915 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.579936028 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.579994917 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.580058098 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.580080032 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.580121040 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.630597115 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630628109 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630639076 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630688906 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630702019 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630709887 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.630747080 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.630748034 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630760908 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.630790949 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.631614923 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.631634951 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.631647110 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.631674051 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.631695986 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.643872976 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.643888950 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.643902063 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.643953085 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.671704054 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.671749115 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.671761990 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.671809912 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.671809912 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.695460081 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.695478916 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.695596933 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.737946987 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.738022089 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.738219023 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.746273041 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746299982 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746314049 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746326923 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746344090 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746927977 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746948957 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746977091 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.746979952 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.746978045 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.747200966 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.747237921 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.747251034 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.747281075 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.747281075 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.759555101 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.759574890 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.759589911 CET16644970766.63.187.113192.168.2.5
        Oct 29, 2024 10:16:12.759712934 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.759712934 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:12.767940044 CET497071664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:17.250309944 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:17.255800962 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:17.255980968 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:17.256269932 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:17.261581898 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.239722967 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.242881060 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:18.248677969 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.257728100 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:18.263403893 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.549163103 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.554172039 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:18.559808016 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917004108 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917020082 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917038918 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917051077 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917063951 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917073011 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:18.917078972 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917090893 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:18.917109966 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:18.917117119 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:18.960582972 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.091919899 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.091941118 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.091958046 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.091980934 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.091994047 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.092001915 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.092052937 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.092252970 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.092327118 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.092340946 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.092350006 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.092355967 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.092370987 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.092374086 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.092437983 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.267982960 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268007040 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268019915 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268032074 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268047094 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268074989 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.268327951 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268340111 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268352985 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268373013 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268378973 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.268388033 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.268407106 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.268433094 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.269525051 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.269540071 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.269553900 CET16644971066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:19.269606113 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:19.296998024 CET497101664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:23.304893970 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:23.310672045 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:23.310746908 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:23.311064005 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:23.316457987 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:23.323327065 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:23.328747034 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.248847961 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.249041080 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:24.254487038 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.335695982 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:24.342238903 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.539918900 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.543488979 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:24.549123049 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.904907942 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.904925108 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.904937029 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.905039072 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:24.905181885 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.905194044 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.905204058 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:24.905271053 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:24.905271053 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.249233007 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249245882 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249264002 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249274015 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249284983 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249298096 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249304056 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.249316931 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249336958 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249346972 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.249346972 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.249365091 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249376059 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249397993 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.249475002 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.249811888 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.249886036 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.250001907 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250017881 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250085115 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250097036 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250112057 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250117064 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.250125885 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250139952 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250152111 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.250185966 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.250185966 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.250252008 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.258317947 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.258347034 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.258358002 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.258364916 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.258398056 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.258512020 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.352742910 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.357111931 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.357141018 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.357152939 CET16644971366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:25.357162952 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.357198000 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:25.357198000 CET497131664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:29.367278099 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:29.372946024 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:29.373087883 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:29.373431921 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:29.378892899 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.336602926 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.336894035 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:30.342395067 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.382596970 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:30.388060093 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.634182930 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.637397051 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:30.642838001 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.978523016 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.978555918 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.978569031 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.978580952 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.978595018 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:30.978610039 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:30.978658915 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.144871950 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.144913912 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.144927025 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.144938946 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.144952059 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.145092010 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.145109892 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.145214081 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.145247936 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.145277023 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.145289898 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.145303011 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.145380974 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.310642958 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310657024 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310731888 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310791016 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.310811043 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310822964 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310834885 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310846090 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.310872078 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.310899973 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.311650038 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.311661959 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.311672926 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.311686993 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.311701059 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.311726093 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.312305927 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.312326908 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.312339067 CET16644973966.63.187.113192.168.2.5
        Oct 29, 2024 10:16:31.312367916 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.314286947 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:31.398190022 CET497391664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:35.414406061 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:35.420186043 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:35.420384884 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:35.420573950 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:35.433106899 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:36.402728081 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:36.402950048 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:36.408539057 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:36.413852930 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:36.419389963 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:36.707387924 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:36.711081982 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:36.716567993 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070153952 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070168018 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070178986 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070184946 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070197105 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070255041 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.070271969 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.070302963 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.245217085 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.245321035 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.245332003 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.245373964 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.245387077 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.245398998 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.245434046 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.246313095 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.246362925 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.246457100 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.246819973 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.246850014 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.246861935 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.246867895 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.246901989 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.249730110 CET16644974066.63.187.113192.168.2.5
        Oct 29, 2024 10:16:37.304320097 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:37.414016008 CET497401664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:41.431293964 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:41.436770916 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:41.436888933 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:41.437149048 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:41.442420959 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:42.399286032 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:42.399632931 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:42.405149937 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:42.516763926 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:42.522393942 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:42.700650930 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:42.704910040 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:42.710988045 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.056972980 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.056998014 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.057008982 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.057041883 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.057054996 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.057065010 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.057081938 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.057128906 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.233045101 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233059883 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233072042 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233083010 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233108997 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.233141899 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.233146906 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233196974 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233208895 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233220100 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233234882 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.233258009 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.233841896 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233870029 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233875990 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.233978987 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.408387899 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408422947 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408505917 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.408521891 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408534050 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408545017 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408556938 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408569098 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.408580065 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.408632040 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.408653021 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.409307003 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.409348011 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.409357071 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.409358978 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.409400940 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.409401894 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.409414053 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.409455061 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.410175085 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.410222054 CET16644974166.63.187.113192.168.2.5
        Oct 29, 2024 10:16:43.410267115 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:43.460798979 CET497411664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:47.479110003 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:47.484662056 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:47.484764099 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:47.485029936 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:47.490931988 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:48.428637981 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:48.428809881 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:48.434415102 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:48.461018085 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:48.467596054 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:48.721596956 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:48.726182938 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:48.731615067 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154347897 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154361963 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154385090 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154427052 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154438019 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154453039 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154463053 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.154473066 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.154525995 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.154525995 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.248500109 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.248542070 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.248563051 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.248575926 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.248588085 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.248657942 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.248855114 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.249007940 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.249033928 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.249044895 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.249082088 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.249083042 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.249083042 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.249217033 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.417434931 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.417514086 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.417525053 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.417536020 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.417548895 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.417874098 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.418016911 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.418029070 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.418040991 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.418052912 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.418061018 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.418869972 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.418890953 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.418951035 CET16644974266.63.187.113192.168.2.5
        Oct 29, 2024 10:16:49.419047117 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:49.460941076 CET497421664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:53.476655006 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:53.482454062 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:53.482764959 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:53.482988119 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:53.488678932 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:54.415596962 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:54.415847063 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:54.421305895 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:54.460916996 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:54.691502094 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:54.707366943 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:54.710906029 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:54.762092113 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.056545973 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.056581020 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.056593895 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.056633949 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.056649923 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.056695938 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.056720018 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.225224018 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225292921 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225306034 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225317955 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225393057 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.225421906 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.225590944 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225603104 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225641012 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.225641966 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225656033 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.225702047 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.226419926 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.226700068 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.226737976 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.392889977 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.392921925 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.392935038 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.392949104 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.393048048 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.393193960 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.393332958 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.393381119 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.393431902 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.393444061 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.393450975 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.393492937 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.394131899 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.394176006 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.394207954 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.394220114 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.394232035 CET16644974366.63.187.113192.168.2.5
        Oct 29, 2024 10:16:55.394258976 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.444961071 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:55.460705042 CET497431664192.168.2.566.63.187.113
        Oct 29, 2024 10:16:59.476722956 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:00.295319080 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:00.295461893 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:00.295825958 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:00.576503038 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:00.576565027 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:00.581918001 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:01.521755934 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:01.521976948 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:01.527304888 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:01.527354956 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:01.533329010 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:01.818816900 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:01.822376013 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:01.828386068 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170711040 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170727968 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170742035 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170754910 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170775890 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.170802116 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.170895100 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170926094 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.170960903 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.342014074 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.342073917 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.342207909 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.342305899 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.342498064 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.342509031 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.342550993 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.342832088 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.342873096 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.343377113 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.343578100 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.343595982 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.343619108 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.344229937 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.344273090 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.344661951 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.398082972 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.513505936 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.513525963 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.513537884 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.513650894 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.513937950 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.514019966 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.514039040 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.514112949 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.514337063 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.514348984 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.514363050 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.514425039 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.515382051 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.515439034 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.515451908 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.515453100 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.515486956 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.515971899 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.516185045 CET16644974466.63.187.113192.168.2.5
        Oct 29, 2024 10:17:02.516227961 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:02.523350954 CET497441664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:06.539155006 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:06.544673920 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:06.544810057 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:06.545067072 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:06.550476074 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:06.570185900 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:06.575647116 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:07.497279882 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:07.497519016 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:07.502902031 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:07.570210934 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:07.575697899 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:07.790996075 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:07.795999050 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:07.801387072 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.160170078 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.160228968 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.160243034 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.160254955 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.160265923 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.160312891 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.160365105 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.328439951 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.328455925 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.328469038 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.328485966 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.328541040 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.328608990 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.329005003 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.329024076 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.329039097 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.329049110 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.329066992 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.329083920 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.329111099 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.329667091 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.329720020 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.496365070 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496403933 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496416092 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496452093 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496475935 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.496531010 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.496694088 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496767998 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496779919 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496800900 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.496809006 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.496846914 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.497524977 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.497606993 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.497654915 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.497968912 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.497982025 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.497992992 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.498011112 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.498018980 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.498054981 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.498759031 CET16644974766.63.187.113192.168.2.5
        Oct 29, 2024 10:17:08.538686991 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:08.570246935 CET497471664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:12.586318970 CET497481664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:12.591860056 CET16644974866.63.187.113192.168.2.5
        Oct 29, 2024 10:17:12.591954947 CET497481664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:12.592279911 CET497481664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:12.597596884 CET16644974866.63.187.113192.168.2.5
        Oct 29, 2024 10:17:13.570410013 CET497481664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:13.731225967 CET16644974866.63.187.113192.168.2.5
        Oct 29, 2024 10:17:13.731338024 CET497481664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:17.585990906 CET497491664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:17.591434956 CET16644974966.63.187.113192.168.2.5
        Oct 29, 2024 10:17:17.591593981 CET497491664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:17.591967106 CET497491664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:17.597312927 CET16644974966.63.187.113192.168.2.5
        Oct 29, 2024 10:17:18.585757017 CET497491664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:18.744683981 CET16644974966.63.187.113192.168.2.5
        Oct 29, 2024 10:17:18.744762897 CET497491664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:18.745857000 CET16644974966.63.187.113192.168.2.5
        Oct 29, 2024 10:17:18.745924950 CET497491664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:22.601695061 CET497501664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:22.607182980 CET16644975066.63.187.113192.168.2.5
        Oct 29, 2024 10:17:22.607278109 CET497501664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:22.607609987 CET497501664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:22.612972975 CET16644975066.63.187.113192.168.2.5
        Oct 29, 2024 10:17:23.561202049 CET16644975066.63.187.113192.168.2.5
        Oct 29, 2024 10:17:23.561378956 CET497501664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:23.566654921 CET16644975066.63.187.113192.168.2.5
        Oct 29, 2024 10:17:23.585838079 CET497501664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:27.601679087 CET497511664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:27.607220888 CET16644975166.63.187.113192.168.2.5
        Oct 29, 2024 10:17:27.607317924 CET497511664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:27.607589006 CET497511664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:27.613018036 CET16644975166.63.187.113192.168.2.5
        Oct 29, 2024 10:17:28.551307917 CET16644975166.63.187.113192.168.2.5
        Oct 29, 2024 10:17:28.551573038 CET497511664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:28.557020903 CET16644975166.63.187.113192.168.2.5
        Oct 29, 2024 10:17:28.601397991 CET497511664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:32.617554903 CET497521664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:32.623030901 CET16644975266.63.187.113192.168.2.5
        Oct 29, 2024 10:17:32.623145103 CET497521664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:32.623492956 CET497521664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:32.629278898 CET16644975266.63.187.113192.168.2.5
        Oct 29, 2024 10:17:33.569989920 CET16644975266.63.187.113192.168.2.5
        Oct 29, 2024 10:17:33.570218086 CET497521664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:33.575733900 CET16644975266.63.187.113192.168.2.5
        Oct 29, 2024 10:17:33.601733923 CET497521664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:37.617379904 CET497531664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:37.622796059 CET16644975366.63.187.113192.168.2.5
        Oct 29, 2024 10:17:37.622910023 CET497531664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:37.623598099 CET497531664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:37.628972054 CET16644975366.63.187.113192.168.2.5
        Oct 29, 2024 10:17:38.552216053 CET16644975366.63.187.113192.168.2.5
        Oct 29, 2024 10:17:38.552439928 CET497531664192.168.2.566.63.187.113
        Oct 29, 2024 10:17:38.557847023 CET16644975366.63.187.113192.168.2.5
        Oct 29, 2024 10:17:38.601291895 CET497531664192.168.2.566.63.187.113

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:05:16:05
        Start date:29/10/2024
        Path:C:\Users\user\Desktop\S1qgnlqr1V.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\S1qgnlqr1V.exe"
        Imagebase:0x500000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000000.00000002.2084110983.00000000041EA000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:05:16:06
        Start date:29/10/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
        Imagebase:0x60000
        File size:433'152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:05:16:06
        Start date:29/10/2024
        Path:C:\Users\user\Desktop\S1qgnlqr1V.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\S1qgnlqr1V.exe"
        Imagebase:0x930000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.3624998267.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.3625042713.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000004.00000002.3614190873.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        Reputation:low
        Has exited:true

        Target ID:5
        Start time:05:16:06
        Start date:29/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:6
        Start time:05:16:07
        Start date:29/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:"schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"
        Imagebase:0xca0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:7
        Start time:05:16:07
        Start date:29/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:8
        Start time:05:16:07
        Start date:29/10/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:"schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp"
        Imagebase:0xca0000
        File size:187'904 bytes
        MD5 hash:48C2FE20575769DE916F48EF0676A965
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:9
        Start time:05:16:08
        Start date:29/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:10
        Start time:05:16:08
        Start date:29/10/2024
        Path:C:\Users\user\Desktop\S1qgnlqr1V.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\S1qgnlqr1V.exe 0
        Imagebase:0xee0000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: Nanocore, Description: detect Nanocore in memory, Source: 0000000A.00000002.2139186404.0000000004B9C000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Reputation:low
        Has exited:true

        Target ID:11
        Start time:05:16:08
        Start date:29/10/2024
        Path:C:\Program Files (x86)\DNS Host\dnshost.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\DNS Host\dnshost.exe" 0
        Imagebase:0xb0000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: Nanocore, Description: detect Nanocore in memory, Source: 0000000B.00000002.2153913266.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 53%, ReversingLabs
        Reputation:low
        Has exited:true

        Target ID:12
        Start time:05:16:09
        Start date:29/10/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
        Imagebase:0x60000
        File size:433'152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:13
        Start time:05:16:09
        Start date:29/10/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"
        Imagebase:0x60000
        File size:433'152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:14
        Start time:05:16:09
        Start date:29/10/2024
        Path:C:\Users\user\Desktop\S1qgnlqr1V.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\S1qgnlqr1V.exe"
        Imagebase:0xe90000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.2194703045.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        Reputation:low
        Has exited:true

        Target ID:15
        Start time:05:16:09
        Start date:29/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:16
        Start time:05:16:09
        Start date:29/10/2024
        Path:C:\Program Files (x86)\DNS Host\dnshost.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\DNS Host\dnshost.exe"
        Imagebase:0xea0000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000010.00000002.2188060482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.2192719441.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.2191980146.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        Reputation:low
        Has exited:true

        Target ID:17
        Start time:05:16:09
        Start date:29/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:18
        Start time:05:16:12
        Start date:29/10/2024
        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
        Imagebase:0x7ff6ef0c0000
        File size:496'640 bytes
        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
        Has elevated privileges:true
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Has exited:true

        Target ID:19
        Start time:05:16:19
        Start date:29/10/2024
        Path:C:\Program Files (x86)\DNS Host\dnshost.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\DNS Host\dnshost.exe"
        Imagebase:0x4f0000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000013.00000002.2225931176.000000000410B000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Has exited:true

        Target ID:20
        Start time:05:16:20
        Start date:29/10/2024
        Path:C:\Program Files (x86)\DNS Host\dnshost.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\DNS Host\dnshost.exe"
        Imagebase:0xde0000
        File size:651'264 bytes
        MD5 hash:10B98A933809918BFCDD9C1EA91EDEE6
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Has exited:true

        Target ID:25
        Start time:05:17:39
        Start date:29/10/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 1756
        Imagebase:0xbb0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:10.4%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:4.9%
          Total number of Nodes:184
          Total number of Limit Nodes:8
          execution_graph 29263 c0d3c0 DuplicateHandle 29264 c0d456 29263->29264 29432 77a3bd8 29434 77a3bfc 29432->29434 29436 77a3534 29434->29436 29440 77a3540 29434->29440 29437 77a4080 OutputDebugStringW 29436->29437 29439 77a40ff 29437->29439 29439->29434 29441 77a4130 CloseHandle 29440->29441 29443 77a419e 29441->29443 29443->29434 29265 cfe0776 29266 cfe077b 29265->29266 29267 cfe06e4 29265->29267 29270 cfe1590 29266->29270 29287 cfe1581 29266->29287 29271 cfe15aa 29270->29271 29272 cfe15ce 29271->29272 29304 cfe1b4d 29271->29304 29309 cfe232e 29271->29309 29313 cfe2091 29271->29313 29317 cfe1c12 29271->29317 29321 cfe1e74 29271->29321 29328 cfe2057 29271->29328 29332 cfe20d6 29271->29332 29337 cfe1b76 29271->29337 29342 cfe1c80 29271->29342 29347 cfe18a0 29271->29347 29353 cfe2023 29271->29353 29358 cfe1a44 29271->29358 29364 cfe1f89 29271->29364 29369 cfe1cc9 29271->29369 29272->29267 29288 cfe1590 29287->29288 29289 cfe15ce 29288->29289 29290 cfe1b76 2 API calls 29288->29290 29291 cfe20d6 2 API calls 29288->29291 29292 cfe2057 2 API calls 29288->29292 29293 cfe1e74 4 API calls 29288->29293 29294 cfe1c12 2 API calls 29288->29294 29295 cfe2091 2 API calls 29288->29295 29296 cfe232e 2 API calls 29288->29296 29297 cfe1b4d 2 API calls 29288->29297 29298 cfe1cc9 2 API calls 29288->29298 29299 cfe1f89 2 API calls 29288->29299 29300 cfe1a44 2 API calls 29288->29300 29301 cfe2023 2 API calls 29288->29301 29302 cfe18a0 2 API calls 29288->29302 29303 cfe1c80 2 API calls 29288->29303 29289->29267 29290->29289 29291->29289 29292->29289 29293->29289 29294->29289 29295->29289 29296->29289 29297->29289 29298->29289 29299->29289 29300->29289 29301->29289 29302->29289 29303->29289 29305 cfe1b70 29304->29305 29374 cfe0007 29305->29374 29378 cfe0040 29305->29378 29306 cfe2492 29311 cfe0007 WriteProcessMemory 29309->29311 29312 cfe0040 WriteProcessMemory 29309->29312 29310 cfe2352 29311->29310 29312->29310 29382 77afe48 29313->29382 29386 77afe43 29313->29386 29314 cfe20ab 29318 cfe1c3e 29317->29318 29390 cfe0128 29317->29390 29394 cfe0130 29317->29394 29318->29272 29398 77aff18 29321->29398 29402 77aff20 29321->29402 29322 cfe1e92 29326 cfe0007 WriteProcessMemory 29322->29326 29327 cfe0040 WriteProcessMemory 29322->29327 29323 cfe226f 29326->29323 29327->29323 29330 77afe48 Wow64SetThreadContext 29328->29330 29331 77afe43 Wow64SetThreadContext 29328->29331 29329 cfe2071 29330->29329 29331->29329 29333 cfe20dc 29332->29333 29406 77af958 29333->29406 29410 77af960 29333->29410 29334 cfe2304 29338 cfe1b7c 29337->29338 29340 cfe0128 ReadProcessMemory 29338->29340 29341 cfe0130 ReadProcessMemory 29338->29341 29339 cfe1c3e 29339->29272 29340->29339 29341->29339 29343 cfe1c91 29342->29343 29345 77af958 ResumeThread 29343->29345 29346 77af960 ResumeThread 29343->29346 29344 cfe2304 29344->29344 29345->29344 29346->29344 29349 cfe18e3 29347->29349 29348 cfe1a60 29348->29272 29349->29348 29414 cfe02bc 29349->29414 29418 cfe02c8 29349->29418 29354 cfe1ff0 29353->29354 29356 cfe0007 WriteProcessMemory 29354->29356 29357 cfe0040 WriteProcessMemory 29354->29357 29355 cfe226f 29356->29355 29357->29355 29360 cfe1982 29358->29360 29359 cfe1a60 29359->29272 29360->29359 29362 cfe02bc CreateProcessA 29360->29362 29363 cfe02c8 CreateProcessA 29360->29363 29361 cfe1adc 29361->29272 29362->29361 29363->29361 29365 cfe1f8f 29364->29365 29367 77af958 ResumeThread 29365->29367 29368 77af960 ResumeThread 29365->29368 29366 cfe2304 29367->29366 29368->29366 29370 cfe1b8d 29369->29370 29372 cfe0128 ReadProcessMemory 29370->29372 29373 cfe0130 ReadProcessMemory 29370->29373 29371 cfe1c3e 29371->29272 29372->29371 29373->29371 29375 cfe0040 WriteProcessMemory 29374->29375 29377 cfe00df 29375->29377 29377->29306 29379 cfe0088 WriteProcessMemory 29378->29379 29381 cfe00df 29379->29381 29381->29306 29383 77afe8d Wow64SetThreadContext 29382->29383 29385 77afed5 29383->29385 29385->29314 29387 77afe48 Wow64SetThreadContext 29386->29387 29389 77afed5 29387->29389 29389->29314 29391 cfe012c ReadProcessMemory 29390->29391 29393 cfe01bf 29391->29393 29393->29318 29395 cfe0133 ReadProcessMemory 29394->29395 29397 cfe01bf 29395->29397 29397->29318 29399 77aff1c VirtualAllocEx 29398->29399 29401 77aff9d 29399->29401 29401->29322 29403 77aff23 VirtualAllocEx 29402->29403 29405 77aff9d 29403->29405 29405->29322 29407 77af95c ResumeThread 29406->29407 29409 77af9d1 29407->29409 29409->29334 29411 77af963 ResumeThread 29410->29411 29413 77af9d1 29411->29413 29413->29334 29415 cfe02c0 CreateProcessA 29414->29415 29417 cfe0513 29415->29417 29419 cfe02cb 29418->29419 29419->29419 29420 cfe04b6 CreateProcessA 29419->29420 29421 cfe0513 29420->29421 29444 c04668 29445 c0467a 29444->29445 29446 c04686 29445->29446 29448 c04778 29445->29448 29449 c0479d 29448->29449 29453 c04888 29449->29453 29457 c04879 29449->29457 29455 c048af 29453->29455 29454 c0498c 29454->29454 29455->29454 29461 c044c4 29455->29461 29459 c048af 29457->29459 29458 c0498c 29458->29458 29459->29458 29460 c044c4 CreateActCtxA 29459->29460 29460->29458 29462 c05918 CreateActCtxA 29461->29462 29464 c059db 29462->29464 29465 c0b3b8 29466 c0b400 GetModuleHandleW 29465->29466 29467 c0b3fa 29465->29467 29468 c0b42d 29466->29468 29467->29466 29469 c0d178 29470 c0d1be GetCurrentProcess 29469->29470 29472 c0d210 GetCurrentThread 29470->29472 29473 c0d209 29470->29473 29474 c0d246 29472->29474 29475 c0d24d GetCurrentProcess 29472->29475 29473->29472 29474->29475 29478 c0d283 29475->29478 29476 c0d2ab GetCurrentThreadId 29477 c0d2dc 29476->29477 29478->29476 29479 77a1b00 29480 77a1b03 29479->29480 29483 77a2a27 29480->29483 29481 77a1bc6 29484 77a2a2c 29483->29484 29488 77a2a78 29484->29488 29492 77a2a68 29484->29492 29485 77a2a5e 29485->29481 29489 77a2a7b 29488->29489 29496 77a2b39 29489->29496 29493 77a2a74 29492->29493 29495 77a2b39 2 API calls 29493->29495 29494 77a2ab5 29494->29485 29495->29494 29497 77a2b40 29496->29497 29501 77a2ca8 29497->29501 29505 77a2ca0 29497->29505 29498 77a2ab5 29498->29485 29502 77a2cab NtQueryInformationProcess 29501->29502 29504 77a2d36 29502->29504 29504->29498 29506 77a2ca4 NtQueryInformationProcess 29505->29506 29508 77a2d36 29506->29508 29508->29498 29422 cfe2730 29423 cfe28bb 29422->29423 29424 cfe2756 29422->29424 29424->29423 29427 cfe29a8 29424->29427 29430 cfe29b0 PostMessageW 29424->29430 29428 cfe29b0 PostMessageW 29427->29428 29429 cfe2a1c 29428->29429 29429->29424 29431 cfe2a1c 29430->29431 29431->29424
          APIs
          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 077A2D27
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: InformationProcessQuery
          • String ID:
          • API String ID: 1778838933-0
          • Opcode ID: 2b599d842a8c575aa11aeb362e0c49b96774539565528f3deb213d7668268b4f
          • Instruction ID: b76dca63470c6232401c35c63c552dfa10842241d0d97be0ee796b3d81054806
          • Opcode Fuzzy Hash: 2b599d842a8c575aa11aeb362e0c49b96774539565528f3deb213d7668268b4f
          • Instruction Fuzzy Hash: 9D21F3B5901349AFCB10CF9AD884ADEFFF5FB88310F10892AE918A7211C375A554CFA4
          APIs
          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 077A2D27
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: InformationProcessQuery
          • String ID:
          • API String ID: 1778838933-0
          • Opcode ID: ac0e13ab61a28fc6d75ab70eb94bbd8588aaa2831b29fb388b2134ecd305d70f
          • Instruction ID: 02243eea86f6d4cc3537be164ded5bcd1f6b3d58ba8419350b7beed9b0c38898
          • Opcode Fuzzy Hash: ac0e13ab61a28fc6d75ab70eb94bbd8588aaa2831b29fb388b2134ecd305d70f
          • Instruction Fuzzy Hash: 2221C0B5900359EFCB10DF9AD884ADEFBF4FB48310F10852AE918A7211C379A554CFA5
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 993b2082f53e627bd8200ed5faa3997244748503900ec0da43086553ce814a09
          • Instruction ID: 08dcf84e651eec304a8fcb0569fa0490f708b0d6da110004b115b88ec9cbe34e
          • Opcode Fuzzy Hash: 993b2082f53e627bd8200ed5faa3997244748503900ec0da43086553ce814a09
          • Instruction Fuzzy Hash: CA4294B4E01219CFDB54CFA9C984B9DBBB2BF88350F5086A9D809A7355D734AE81CF50
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a56b64f3f93ab768cdb6d8072122cae3cb5724a07503840c2a697513a8bc78b6
          • Instruction ID: 0c6ba167b3da7e6a6382352c17821b83b8a1d260f0169ddb8db93cf33fc6ac25
          • Opcode Fuzzy Hash: a56b64f3f93ab768cdb6d8072122cae3cb5724a07503840c2a697513a8bc78b6
          • Instruction Fuzzy Hash: 74E1BE31B027049FDB29DB79C458BAE77F6AF89700F24446DE1469B3A0CB35E909CB52
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 47294e0149519a407088338d79eb56acc14b3a22fc3dbc3d8f7cfa0fe0f03612
          • Instruction ID: f6a9d2ad79d4af5d5bf325f1f4e434ee10d7dae5185fcaa043f25698a2fa4fa3
          • Opcode Fuzzy Hash: 47294e0149519a407088338d79eb56acc14b3a22fc3dbc3d8f7cfa0fe0f03612
          • Instruction Fuzzy Hash: 5971F772D45229CBDB68CF66C8407EEB7B6BF89300F10D1AAD40DA6251EB745AC5CF41
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0124574f6546f70b5cd9c69bdcad3ec86afc4cac5f6c1243c1ca28a8921edd31
          • Instruction ID: 64b6bc8600443f17f5d0ee6073e30f175d997acc2dfd1d1c281e730bffa57a28
          • Opcode Fuzzy Hash: 0124574f6546f70b5cd9c69bdcad3ec86afc4cac5f6c1243c1ca28a8921edd31
          • Instruction Fuzzy Hash: D871C5B4E01219DFEB18CFAAD894B9DBBB2BF88340F14C5AAD808A7355D7359941CF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 294 c0d168-c0d207 GetCurrentProcess 298 c0d210-c0d244 GetCurrentThread 294->298 299 c0d209-c0d20f 294->299 300 c0d246-c0d24c 298->300 301 c0d24d-c0d281 GetCurrentProcess 298->301 299->298 300->301 302 c0d283-c0d289 301->302 303 c0d28a-c0d2a5 call c0d347 301->303 302->303 307 c0d2ab-c0d2da GetCurrentThreadId 303->307 308 c0d2e3-c0d345 307->308 309 c0d2dc-c0d2e2 307->309 309->308
          APIs
          • GetCurrentProcess.KERNEL32 ref: 00C0D1F6
          • GetCurrentThread.KERNEL32 ref: 00C0D233
          • GetCurrentProcess.KERNEL32 ref: 00C0D270
          • GetCurrentThreadId.KERNEL32 ref: 00C0D2C9
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 73608f6c26d7a3a6f49eeeca94c3a6f538c8c6ce3bdcee4bbfd34793fb94bd99
          • Instruction ID: 41e23960e0a536aa7596ccebf98c4db6bae69668f8bdacf719abe45074079023
          • Opcode Fuzzy Hash: 73608f6c26d7a3a6f49eeeca94c3a6f538c8c6ce3bdcee4bbfd34793fb94bd99
          • Instruction Fuzzy Hash: 3D5165B0900349CFDB14DFA9D548B9EBBF5EF49304F20805AE019A73A0D738AD84CBA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 316 c0d178-c0d207 GetCurrentProcess 320 c0d210-c0d244 GetCurrentThread 316->320 321 c0d209-c0d20f 316->321 322 c0d246-c0d24c 320->322 323 c0d24d-c0d281 GetCurrentProcess 320->323 321->320 322->323 324 c0d283-c0d289 323->324 325 c0d28a-c0d2a5 call c0d347 323->325 324->325 329 c0d2ab-c0d2da GetCurrentThreadId 325->329 330 c0d2e3-c0d345 329->330 331 c0d2dc-c0d2e2 329->331 331->330
          APIs
          • GetCurrentProcess.KERNEL32 ref: 00C0D1F6
          • GetCurrentThread.KERNEL32 ref: 00C0D233
          • GetCurrentProcess.KERNEL32 ref: 00C0D270
          • GetCurrentThreadId.KERNEL32 ref: 00C0D2C9
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 3477c88b126ab0fa0a9792781663f246c65e20d9dff33b212edde870b531885f
          • Instruction ID: 84c636eae7d65db834ecd11a0b9fe782acb92a4e447d50fc327915fd2449b753
          • Opcode Fuzzy Hash: 3477c88b126ab0fa0a9792781663f246c65e20d9dff33b212edde870b531885f
          • Instruction Fuzzy Hash: A35155B0900249CFDB14DFA9D548BAEBBF5EF48304F208459E019A73A0D778A984CBA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 360 cfe02bc-cfe02be 361 cfe02c7-cfe02c9 360->361 362 cfe02c0-cfe02c2 360->362 363 cfe02cb-cfe035d 361->363 362->363 364 cfe02c4-cfe02c6 362->364 367 cfe035f-cfe0369 363->367 368 cfe0396-cfe03b6 363->368 364->361 367->368 369 cfe036b-cfe036d 367->369 375 cfe03ef-cfe041e 368->375 376 cfe03b8-cfe03c2 368->376 370 cfe036f-cfe0379 369->370 371 cfe0390-cfe0393 369->371 373 cfe037d-cfe038c 370->373 374 cfe037b 370->374 371->368 373->373 377 cfe038e 373->377 374->373 384 cfe0457-cfe0511 CreateProcessA 375->384 385 cfe0420-cfe042a 375->385 376->375 378 cfe03c4-cfe03c6 376->378 377->371 379 cfe03c8-cfe03d2 378->379 380 cfe03e9-cfe03ec 378->380 382 cfe03d6-cfe03e5 379->382 383 cfe03d4 379->383 380->375 382->382 386 cfe03e7 382->386 383->382 396 cfe051a-cfe05a0 384->396 397 cfe0513-cfe0519 384->397 385->384 387 cfe042c-cfe042e 385->387 386->380 389 cfe0430-cfe043a 387->389 390 cfe0451-cfe0454 387->390 391 cfe043e-cfe044d 389->391 392 cfe043c 389->392 390->384 391->391 394 cfe044f 391->394 392->391 394->390 407 cfe05a2-cfe05a6 396->407 408 cfe05b0-cfe05b4 396->408 397->396 407->408 409 cfe05a8 407->409 410 cfe05b6-cfe05ba 408->410 411 cfe05c4-cfe05c8 408->411 409->408 410->411 412 cfe05bc 410->412 413 cfe05ca-cfe05ce 411->413 414 cfe05d8-cfe05dc 411->414 412->411 413->414 415 cfe05d0 413->415 416 cfe05ee-cfe05f5 414->416 417 cfe05de-cfe05e4 414->417 415->414 418 cfe060c 416->418 419 cfe05f7-cfe0606 416->419 417->416 421 cfe060d 418->421 419->418 421->421
          APIs
          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0CFE04FE
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 761e2d71509c6a5f391a5f6f4cc0f80e1ca90cde3428cf21f500bc3b566ad62a
          • Instruction ID: 16be40eb5c1f1d5f3e2d8ccab27cdc247c5610d058d5a80d30ce481fe15e3c8b
          • Opcode Fuzzy Hash: 761e2d71509c6a5f391a5f6f4cc0f80e1ca90cde3428cf21f500bc3b566ad62a
          • Instruction Fuzzy Hash: D2A17171E01319DFDB20CF68C9417EEBBB2BF44310F14816AD858A7294DBB49985DF92

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 422 cfe02c8-cfe035d 425 cfe035f-cfe0369 422->425 426 cfe0396-cfe03b6 422->426 425->426 427 cfe036b-cfe036d 425->427 433 cfe03ef-cfe041e 426->433 434 cfe03b8-cfe03c2 426->434 428 cfe036f-cfe0379 427->428 429 cfe0390-cfe0393 427->429 431 cfe037d-cfe038c 428->431 432 cfe037b 428->432 429->426 431->431 435 cfe038e 431->435 432->431 442 cfe0457-cfe0511 CreateProcessA 433->442 443 cfe0420-cfe042a 433->443 434->433 436 cfe03c4-cfe03c6 434->436 435->429 437 cfe03c8-cfe03d2 436->437 438 cfe03e9-cfe03ec 436->438 440 cfe03d6-cfe03e5 437->440 441 cfe03d4 437->441 438->433 440->440 444 cfe03e7 440->444 441->440 454 cfe051a-cfe05a0 442->454 455 cfe0513-cfe0519 442->455 443->442 445 cfe042c-cfe042e 443->445 444->438 447 cfe0430-cfe043a 445->447 448 cfe0451-cfe0454 445->448 449 cfe043e-cfe044d 447->449 450 cfe043c 447->450 448->442 449->449 452 cfe044f 449->452 450->449 452->448 465 cfe05a2-cfe05a6 454->465 466 cfe05b0-cfe05b4 454->466 455->454 465->466 467 cfe05a8 465->467 468 cfe05b6-cfe05ba 466->468 469 cfe05c4-cfe05c8 466->469 467->466 468->469 470 cfe05bc 468->470 471 cfe05ca-cfe05ce 469->471 472 cfe05d8-cfe05dc 469->472 470->469 471->472 473 cfe05d0 471->473 474 cfe05ee-cfe05f5 472->474 475 cfe05de-cfe05e4 472->475 473->472 476 cfe060c 474->476 477 cfe05f7-cfe0606 474->477 475->474 479 cfe060d 476->479 477->476 479->479
          APIs
          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0CFE04FE
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 9a47a1b7c8fb36f2cd213d210a967c143426e23c74f4f1c6d9469e0c41cafcaf
          • Instruction ID: 6caad36182d686e960f2ed5a11daae91220846eaaa43b55211dbe7a35132807f
          • Opcode Fuzzy Hash: 9a47a1b7c8fb36f2cd213d210a967c143426e23c74f4f1c6d9469e0c41cafcaf
          • Instruction Fuzzy Hash: 9E917171E01319CFDB10CF68C941BEDBBB2BF48310F14816AD858A7294DBB49985DF92

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 480 c044c4-c059d9 CreateActCtxA 483 c059e2-c05a3c 480->483 484 c059db-c059e1 480->484 491 c05a4b-c05a4f 483->491 492 c05a3e-c05a41 483->492 484->483 493 c05a60 491->493 494 c05a51-c05a5d 491->494 492->491 496 c05a61 493->496 494->493 496->496
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00C059C9
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 16846738657e71b7c4ab3645af009c1d84b726131e58e99d7bdeaddf2664a61c
          • Instruction ID: 09090903eca9f3e387b0606a1a24e997c87eb34dc0d51a90f8834c213afbf855
          • Opcode Fuzzy Hash: 16846738657e71b7c4ab3645af009c1d84b726131e58e99d7bdeaddf2664a61c
          • Instruction Fuzzy Hash: 4441E5B0D0071DCBDB24DFA9C8847DEBBB5BF48304F20815AD419AB255D775A946CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 497 c0590d-c059d9 CreateActCtxA 499 c059e2-c05a3c 497->499 500 c059db-c059e1 497->500 507 c05a4b-c05a4f 499->507 508 c05a3e-c05a41 499->508 500->499 509 c05a60 507->509 510 c05a51-c05a5d 507->510 508->507 512 c05a61 509->512 510->509 512->512
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00C059C9
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 6cb60af67b8860e5b9fa77408157fd3d16f907af3babeaf4a645a0f5f0d4bb84
          • Instruction ID: 0454ff20976a1be9a7dbcbc8f7678be442679fafc9a1f672d6b0d89bf03d7c16
          • Opcode Fuzzy Hash: 6cb60af67b8860e5b9fa77408157fd3d16f907af3babeaf4a645a0f5f0d4bb84
          • Instruction Fuzzy Hash: 1B41F2B0D00719CFDB24DFA9C8847DEBBB5BF48304F20806AD458AB294DB75694ACF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 513 cfe0007-cfe008e 516 cfe009e-cfe00dd WriteProcessMemory 513->516 517 cfe0090-cfe009c 513->517 519 cfe00df-cfe00e5 516->519 520 cfe00e6-cfe0116 516->520 517->516 519->520
          APIs
          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0CFE00D0
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 4e31475c1e47849c8d2f283aeafb5095fb9d3be237ddd12934005049d4af308d
          • Instruction ID: 45dc74f886a774a32dd0d0253344b3594df73c45cac82b54fa2f58f07d1bab4d
          • Opcode Fuzzy Hash: 4e31475c1e47849c8d2f283aeafb5095fb9d3be237ddd12934005049d4af308d
          • Instruction Fuzzy Hash: 7C31CC718093889FCB11CFA9C8446DEBFF1FF4A310F1484AED988A7252C7799945DBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 524 cfe0040-cfe008e 526 cfe009e-cfe00dd WriteProcessMemory 524->526 527 cfe0090-cfe009c 524->527 529 cfe00df-cfe00e5 526->529 530 cfe00e6-cfe0116 526->530 527->526 529->530
          APIs
          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0CFE00D0
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 2aa4b52a97a07c30863243031bef4412219cfeb206124bb90ae42cd2f9d0e8c4
          • Instruction ID: 36ae59292099d4592ca3c73f4ed9a441b361a86ebe9d19739b2f39247fd02fd1
          • Opcode Fuzzy Hash: 2aa4b52a97a07c30863243031bef4412219cfeb206124bb90ae42cd2f9d0e8c4
          • Instruction Fuzzy Hash: 4C2139B1D003499FCB10DFAAC885BEEBBF5FF48310F108429E959A7250C7799944DBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 534 77afe43-77afe93 537 77afea3-77afed3 Wow64SetThreadContext 534->537 538 77afe95-77afea1 534->538 540 77afedc-77aff0c 537->540 541 77afed5-77afedb 537->541 538->537 541->540
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 077AFEC6
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 08ba06f042ad9b08011a08bac42986d501f9f6eb94f39d1ac40e4ca54076dad1
          • Instruction ID: cc8f543b779d1145e7bb142af33bdbe9d7db6b614961aa74c88cf4278f9ad5fb
          • Opcode Fuzzy Hash: 08ba06f042ad9b08011a08bac42986d501f9f6eb94f39d1ac40e4ca54076dad1
          • Instruction Fuzzy Hash: 372157B19003099FDB10DFAAC4847EEBBF4EF88364F14842AD459A7241CB78A945CFA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 545 cfe0128-cfe012a 546 cfe012c-cfe0131 545->546 547 cfe0133-cfe01bd ReadProcessMemory 545->547 546->547 550 cfe01bf-cfe01c5 547->550 551 cfe01c6-cfe01f6 547->551 550->551
          APIs
          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0CFE01B0
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: 4288c9dac003a53ebae4958169121098987df33ca20db7e8c348f061b17fc70b
          • Instruction ID: fa59947133b31b40f0eeb76e3a397ce28f9b58539f09318eacd0d3d48108023b
          • Opcode Fuzzy Hash: 4288c9dac003a53ebae4958169121098987df33ca20db7e8c348f061b17fc70b
          • Instruction Fuzzy Hash: 552128B1D003499FCB10DFAAC884AEEBBF5FF48320F508429E559A7250CB799944DBA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 555 c0b390-c0b3f8 557 c0b400-c0b42b GetModuleHandleW 555->557 558 c0b3fa-c0b3fd 555->558 559 c0b434-c0b448 557->559 560 c0b42d-c0b433 557->560 558->557 560->559
          APIs
          • GetModuleHandleW.KERNEL32(00000000), ref: 00C0B41E
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: d509f5671b35a2a014a97622abb946ea424f3493b18c738c4f81855038a3c338
          • Instruction ID: 7e45a23d40baa183194c4c82033060b5696afec7740cf66db400d63a4d2ecf17
          • Opcode Fuzzy Hash: d509f5671b35a2a014a97622abb946ea424f3493b18c738c4f81855038a3c338
          • Instruction Fuzzy Hash: 69216DB1C097888FDB11DFAAD4446DEBFF0EF49314F15849AC458A7262C3396949CFA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 562 77afe48-77afe93 564 77afea3-77afed3 Wow64SetThreadContext 562->564 565 77afe95-77afea1 562->565 567 77afedc-77aff0c 564->567 568 77afed5-77afedb 564->568 565->564 568->567
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 077AFEC6
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 3edd08bf351494f51037e64001079d6ef0bd25223a4594593a2ebed5862829e8
          • Instruction ID: 5ad35a0e7924288fce68851db2f5f255ad5169e3a9b03b3eca5786dc001e7019
          • Opcode Fuzzy Hash: 3edd08bf351494f51037e64001079d6ef0bd25223a4594593a2ebed5862829e8
          • Instruction Fuzzy Hash: 622158B1D003099FDB10DFAAC4857EEBBF4EF88360F14842AD559A7241CB78A944CFA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 572 cfe0130-cfe01bd ReadProcessMemory 576 cfe01bf-cfe01c5 572->576 577 cfe01c6-cfe01f6 572->577 576->577
          APIs
          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0CFE01B0
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: dcc98893b57a1b71d6a189fa2d8abded8986bc93be85633f5eea1d343d00f04c
          • Instruction ID: 906ef67d856dc90065141cff87392abed9aedd320b0a8c246d66738a78a7781e
          • Opcode Fuzzy Hash: dcc98893b57a1b71d6a189fa2d8abded8986bc93be85633f5eea1d343d00f04c
          • Instruction Fuzzy Hash: 092139B1C003499FCB10DFAAC884AEEFBF5FF48310F108429E559A7250C7789544DBA1
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C0D447
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 9ebe8c64f2031c50986deb9614462607f8caf89fc14c2f753763b18a69df0e43
          • Instruction ID: 84663dd738cbf7c555c16cd4e0e35b6c017c72e59900d4b9cebafd6e4e44be2b
          • Opcode Fuzzy Hash: 9ebe8c64f2031c50986deb9614462607f8caf89fc14c2f753763b18a69df0e43
          • Instruction Fuzzy Hash: 9D21C4B59002499FDB10CF9AD584ADEBBF9FB48310F14841AE958A3350D379A944CFA5
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C0D447
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: dd27837cb3b34d863671f3dd3191479a8f2fa01f635c95cfa013a81642be2ff9
          • Instruction ID: 1350261879cdc97eaf228530be74ce5d68146c239c76397796933f555b83f463
          • Opcode Fuzzy Hash: dd27837cb3b34d863671f3dd3191479a8f2fa01f635c95cfa013a81642be2ff9
          • Instruction Fuzzy Hash: 3C21E3B5900209DFDB10CF9AD584AEEBBF5FB48310F14841AE958A3250C778A954CFA4
          APIs
          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 077AFF8E
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 764b4cc28e2a294885f47ebd7e23d80e82924ad31a8d4773f546a4e1eb57578c
          • Instruction ID: 7a7b03b2b0ca9a6344725c4a3a74ce8c9195a2b594952ed831ff2dccb86e6112
          • Opcode Fuzzy Hash: 764b4cc28e2a294885f47ebd7e23d80e82924ad31a8d4773f546a4e1eb57578c
          • Instruction Fuzzy Hash: 03117FB5800249AFDB20DFAAC845ADFBFF5EF88320F148419E519A7250CB399550CFE1
          APIs
          • OutputDebugStringW.KERNEL32(00000000), ref: 077A40F0
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DebugOutputString
          • String ID:
          • API String ID: 1166629820-0
          • Opcode ID: 13685574616240b5508e78fbd92fd332b134519da234b77c1f2ca9a0a9f38ae5
          • Instruction ID: 849c05833a8ead16964e97b338c3c1425e76f8374c089ac01393eb125cfb7d1e
          • Opcode Fuzzy Hash: 13685574616240b5508e78fbd92fd332b134519da234b77c1f2ca9a0a9f38ae5
          • Instruction Fuzzy Hash: 0D1117B1C00659AFDB10DF9AD4446DEFBF4FB88320F10856AD918A3640C775A544CFA5
          APIs
          • OutputDebugStringW.KERNEL32(00000000), ref: 077A40F0
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DebugOutputString
          • String ID:
          • API String ID: 1166629820-0
          • Opcode ID: 8a8041fb0f5d5e57eb70fcfc6c7926559635acc2ffdd98dc5695017675e903b8
          • Instruction ID: 23721f33c1f9ab37ccc36dec52b94805778f1cb44bc3d9f6586369180b885cbd
          • Opcode Fuzzy Hash: 8a8041fb0f5d5e57eb70fcfc6c7926559635acc2ffdd98dc5695017675e903b8
          • Instruction Fuzzy Hash: 381114B1C0465AABCB10DF9AD444A9EFBF4FB89350F10866AD918A3240C379A944CFA5
          APIs
          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 077AFF8E
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 406e889db908f0d0644940a2d04bff77869e56154d463912595292a15fe8e877
          • Instruction ID: 5b9e2c094f17d79a7ddc61e6ede58428d9a4a0c7f63cc8122b0645c47c2af34a
          • Opcode Fuzzy Hash: 406e889db908f0d0644940a2d04bff77869e56154d463912595292a15fe8e877
          • Instruction Fuzzy Hash: D21149B18002499FDB20DFAAC844AEFBFF5EF88320F148819E519A7250C779A544CFA0
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: 6c44ef3dfcec0cd1bb04862be25494ff389e8b836145e1e3d8a749f1ad64f57e
          • Instruction ID: 10f76388e25c3740fd407aa9db73bdb5012a750f8c6ee3433acb9b39d722327b
          • Opcode Fuzzy Hash: 6c44ef3dfcec0cd1bb04862be25494ff389e8b836145e1e3d8a749f1ad64f57e
          • Instruction Fuzzy Hash: 23115BB1D002499FDB20DFAAC444BEEFBF5EF88324F24881AD559A7240C739A545CF94
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: 3802d7bc0cb941f79a23c855122e1febda248dc6b7ac2dd7e42b3395b175feaf
          • Instruction ID: ddd649ca1fe96f7e9af996f4f3de03647e3722903e81562d184e3ac22570e1dd
          • Opcode Fuzzy Hash: 3802d7bc0cb941f79a23c855122e1febda248dc6b7ac2dd7e42b3395b175feaf
          • Instruction Fuzzy Hash: 47113AB1D003499FDB20DFAAC4457AEFBF5EF88320F24881AD559A7250CB79A544CFA4
          APIs
          • GetModuleHandleW.KERNEL32(00000000), ref: 00C0B41E
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: acd60febd3e6546e3ec07abc832299346a5a9c006e9e51818dcca4381eae7b08
          • Instruction ID: ea0d6085d3199b39ab6936f9ab3c210e241b5995303f9ab04550d88fc0757791
          • Opcode Fuzzy Hash: acd60febd3e6546e3ec07abc832299346a5a9c006e9e51818dcca4381eae7b08
          • Instruction Fuzzy Hash: A9110FB5C006498FCB20CF9AC444ADEFBF4AF88324F14841AD528A7250C379AA45CFA1
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 0CFE2A0D
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 061471ce9a1d2b91868f2220dc06b55caacbcf516524c4c178efbb3a33e9056e
          • Instruction ID: 9fe637ce4f712272635aa2d03c35d3432911afc7df971f3eaa310e4cb124b909
          • Opcode Fuzzy Hash: 061471ce9a1d2b91868f2220dc06b55caacbcf516524c4c178efbb3a33e9056e
          • Instruction Fuzzy Hash: 5E11C2B58003499FDB20DF9AD449BDEBBF8EB48720F10845AE558A7210D379A944CFA5
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 0CFE2A0D
          Memory Dump Source
          • Source File: 00000000.00000002.2098839137.000000000CFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CFE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cfe0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 7febf2304d4239287d3a12f949e808921545888f2cedfb5150e89b3c66b085a1
          • Instruction ID: dc586517eabcf5c4163dcfdd77e260dc59ba37b8b87812cee89628e5180be37b
          • Opcode Fuzzy Hash: 7febf2304d4239287d3a12f949e808921545888f2cedfb5150e89b3c66b085a1
          • Instruction Fuzzy Hash: E511D3B58003499FDB20DF9AD445BDEFBF8EB48720F108419E558A7210D379A944CFA5
          APIs
          • CloseHandle.KERNEL32(00000000), ref: 077A418F
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 54c7e4437723aa3bc55a0ce90e45b660efd5a0777573bab7f76c8d3e85e7d64b
          • Instruction ID: 0c903308674c53bda5f19daed94cf7e100185f423df24b325ba11cd930efaf47
          • Opcode Fuzzy Hash: 54c7e4437723aa3bc55a0ce90e45b660efd5a0777573bab7f76c8d3e85e7d64b
          • Instruction Fuzzy Hash: DB1128B18002499FDB10DF9AC444BEEFBF4EB49320F208469E558A3651D379A944CFA5
          APIs
          • CloseHandle.KERNEL32(00000000), ref: 077A418F
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 94060484fe4d8dfbf4f38498bcd45467f6c6b383b69b9d8c94d882a298a09336
          • Instruction ID: f69ecfab54cec16eff34d5dbe6135d7cb708f758b00bc1846baa1bca8a699b3c
          • Opcode Fuzzy Hash: 94060484fe4d8dfbf4f38498bcd45467f6c6b383b69b9d8c94d882a298a09336
          • Instruction Fuzzy Hash: 3D1128B18002499FEB20DF9AC4447EEBBF4EF49324F248469D558A3251D379A544CFA5
          Memory Dump Source
          • Source File: 00000000.00000002.2079143721.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b8d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a0f2ef774f6a1d15a04e8ebda7c539c65c1a2877826f30084494134e618b79c9
          • Instruction ID: d7e813263e7579ff69c07e28a878b574f55ad3e7cbd87c0b2b6509f11c23e170
          • Opcode Fuzzy Hash: a0f2ef774f6a1d15a04e8ebda7c539c65c1a2877826f30084494134e618b79c9
          • Instruction Fuzzy Hash: AE210A71504204DFDB05EF14D9C0F16BFA5FB98324F28C5AAD9090B3A6C33AE856D7A2
          Memory Dump Source
          • Source File: 00000000.00000002.2079180986.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b9d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0debc2b170c2926f20a06971cf99d7fc069ecc08ab4cdfd900e73ade611cba0d
          • Instruction ID: 34331b1f1273aa2c1c164dcf6d13e4eee9abfce50e450b56614a3237caa48466
          • Opcode Fuzzy Hash: 0debc2b170c2926f20a06971cf99d7fc069ecc08ab4cdfd900e73ade611cba0d
          • Instruction Fuzzy Hash: E721D071604204DFDF14DF24D9D4B26BFA5FB88314F20C5B9D94A4B296C33AD806CA61
          Memory Dump Source
          • Source File: 00000000.00000002.2079180986.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b9d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ce453ca5b314a242fbc019469454d564fb9fe3f665f2695cd8c95d506ecfdec5
          • Instruction ID: f3a5f762a7dc9d46c871c315d04b288aa05955347233bdb246c7f652384d396b
          • Opcode Fuzzy Hash: ce453ca5b314a242fbc019469454d564fb9fe3f665f2695cd8c95d506ecfdec5
          • Instruction Fuzzy Hash: 55210471604204EFDF05DF25D9C0F26BBA5FB88314F20C5BDE9094B296C33AD806CA61
          Memory Dump Source
          • Source File: 00000000.00000002.2079180986.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b9d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0a65caa3e1d6dcb0ced5f849dda5539bcf1c5e9d1d3cd14b18b65900e3303016
          • Instruction ID: 5a8ef8683bebf9ee7b1b9247ec27c802bd80da8cf2c5ede68896c0d6560bdc46
          • Opcode Fuzzy Hash: 0a65caa3e1d6dcb0ced5f849dda5539bcf1c5e9d1d3cd14b18b65900e3303016
          • Instruction Fuzzy Hash: 412196755093808FDB16CF24D5A4715BFB1FB46314F28C5EAD8498B697C33AD80ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.2079143721.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b8d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: d7ff80cac3b4cbb8fa0610f865cf53177a28017da094b987c2669b5679272ca2
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: 43110672504240DFCB02DF00D5C4B16BFB1FB94314F28C6AAD9090B366C33AD45ACBA1
          Memory Dump Source
          • Source File: 00000000.00000002.2079180986.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b9d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction ID: 7e4e049f85b781597c491000677b86f76214a43a424c7518e2a3f873ad6cd6e7
          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction Fuzzy Hash: 7D118B75504280DFDB16CF14D5C4B15BBA1FB84314F24C6A9D8494B6A6C33AD84ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.2079143721.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b8d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c541fee14f5ddc28c0d37bc2ef512d50dd8e2edfa3ca9aaa30c488ae8040e9a0
          • Instruction ID: a15b6193896cdef74f721f6aba0e7e73d798ae4e9b558421d757f349febe1efe
          • Opcode Fuzzy Hash: c541fee14f5ddc28c0d37bc2ef512d50dd8e2edfa3ca9aaa30c488ae8040e9a0
          • Instruction Fuzzy Hash: FF01A775104344DAE720AB15DDC4B66BFD8EF55360F28C5ABED090A2E6C67D9C40C7B1
          Memory Dump Source
          • Source File: 00000000.00000002.2079143721.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_b8d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8033b552daae51122d7eb1b2c54a0ae5aa70d38beeee63f533fe63a25b460ae1
          • Instruction ID: fe6791431e541530168f5386059ed48a2c2c68d165920e0f661f671fe1e4925e
          • Opcode Fuzzy Hash: 8033b552daae51122d7eb1b2c54a0ae5aa70d38beeee63f533fe63a25b460ae1
          • Instruction Fuzzy Hash: 6CF0CD75004344EEEB208A0ADC84B62FFE8EF51734F18C59BED080B296C279AC44CBB1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID: }P
          • API String ID: 0-459933098
          • Opcode ID: 3d8bda37a2a1ae498c6c11498ec38fa36deee9c91864b4f9170cac925641d759
          • Instruction ID: 7476c19a53095a3360e6f80dadeb524acb27cc6ea21da83c3ebaf25000f4d33e
          • Opcode Fuzzy Hash: 3d8bda37a2a1ae498c6c11498ec38fa36deee9c91864b4f9170cac925641d759
          • Instruction Fuzzy Hash: AFE11DB4E042199FDB14DFA9C5809AEFBF2FF89301F248169D415AB35AC730AA41CF61
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 17ffcfe0d133c43497298ae9fdf6d978ccf30f47e429adf8fe3726f960ff0d76
          • Instruction ID: 7b3e2f6115f9574d67ee8e09ead1916e8026a2d85823a5740825735c6892c1e9
          • Opcode Fuzzy Hash: 17ffcfe0d133c43497298ae9fdf6d978ccf30f47e429adf8fe3726f960ff0d76
          • Instruction Fuzzy Hash: 0DE13EB4E042199FDB14DFA8C5809AEFBF2FF89301F648269D415AB356D731AA41CF60
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f917e4b9a620e45cd160a53bd813fe65869d6121d98c1270cad25dfe8d879424
          • Instruction ID: 8c258f2442cd68cb269818eb31ad8a472c5161007fe6172b7561a0c02ead4327
          • Opcode Fuzzy Hash: f917e4b9a620e45cd160a53bd813fe65869d6121d98c1270cad25dfe8d879424
          • Instruction Fuzzy Hash: 98E11FB4E142199FDB14DFA8C5809AEFBF2FF89305F248169D415AB356D730AA41CFA0
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e8ad1aa519c10bd3a23b7600ff1a03413bfb398911869d3c98951091aeb0e72d
          • Instruction ID: 1bf998df17e53399b709d06ef946fc1e36c5b7442d8155158121e5f5a29fadfb
          • Opcode Fuzzy Hash: e8ad1aa519c10bd3a23b7600ff1a03413bfb398911869d3c98951091aeb0e72d
          • Instruction Fuzzy Hash: BEE12FB4E002199FDB14DF99C5809AEFBF2FF89345F248269D415AB35AD730AA41CF60
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 48e3a0239238c9f8096cc9fcb0eb543deeb1735b8d4cfba65156801b2269409a
          • Instruction ID: 35044e793455e31f3167cfd81608ad4193a3c24bec3754908905d054d64a6a1b
          • Opcode Fuzzy Hash: 48e3a0239238c9f8096cc9fcb0eb543deeb1735b8d4cfba65156801b2269409a
          • Instruction Fuzzy Hash: 18E11EB4E002199FDB14DFA9C5809AEFBB2FF89305F248169D415AB356D730AE41CFA0
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: db0f3abc839e6446bb36349b2bb5e81594473ee1e08d7bb78f598f3505b6f998
          • Instruction ID: 92b320c97c1084c918c2a3937e0a709fdb396e5e34eebea3ffdf67fc1b956063
          • Opcode Fuzzy Hash: db0f3abc839e6446bb36349b2bb5e81594473ee1e08d7bb78f598f3505b6f998
          • Instruction Fuzzy Hash: 16E11FB4E142199FDB14DFA8C5809AEFBF2FF89305F248169D415AB356D730AA41CFA0
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ee5c74fdfacb32102b279d525893311c0f21a096fec2f014ea69063206026115
          • Instruction ID: 5fbd2194b3867453685b8dad21162debdb254e7fc791374205481ca489b1da7b
          • Opcode Fuzzy Hash: ee5c74fdfacb32102b279d525893311c0f21a096fec2f014ea69063206026115
          • Instruction Fuzzy Hash: 55E14DB4E002199FDB14DFA9C5809AEFBF2FF89305F248669D415AB316D730AA41CF60
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c821d2d1c693bb02323f3456e0ca0604e51ffed5d84ad0e0d05b0bd932fa6c49
          • Instruction ID: 45c1ca0fdfea348e3e58a75303dd2e3dac630537b500fa260ac55cd79d46536b
          • Opcode Fuzzy Hash: c821d2d1c693bb02323f3456e0ca0604e51ffed5d84ad0e0d05b0bd932fa6c49
          • Instruction Fuzzy Hash: E9E10BB4E042199FDB14DFA9C5809AEFBF2FF89305F248259D415AB35AD730AA41CF60
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 436ed9a1b7fadfb07113c3bd3f1fb343d0a3ead4c66bded11efce40c0f092f2d
          • Instruction ID: f75bc5e403c0f853ba3e7d0ee64b58738789cbf326a97d4412620ad806708ffe
          • Opcode Fuzzy Hash: 436ed9a1b7fadfb07113c3bd3f1fb343d0a3ead4c66bded11efce40c0f092f2d
          • Instruction Fuzzy Hash: 4BD12631D6075ADACB10EF64D950A9DB7B5FF95300F20C79AE0097B225EB706AC9CB81
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c930b3445cf5dcaac8fd385a9b32feea3e73e7c698325a3497a94b08bdfdd6c0
          • Instruction ID: 5b4018b4177908d3a748a009cc9f34030ab440643ac4d58eed743ed03985b377
          • Opcode Fuzzy Hash: c930b3445cf5dcaac8fd385a9b32feea3e73e7c698325a3497a94b08bdfdd6c0
          • Instruction Fuzzy Hash: 2AD12631D6075ADACB10EF64D950A9DB7B5FF95300F20C79AE0097B225EB706AC9CB81
          Memory Dump Source
          • Source File: 00000000.00000002.2079416889.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c00000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d588f9f72ea59380ceb62bf835eac7764339e43ac3d112ba76ffd38f4dbf89b0
          • Instruction ID: 34d1961d01b982a7fdd5088168666a330aec0fee4b28b4f10be98ed3b271a19e
          • Opcode Fuzzy Hash: d588f9f72ea59380ceb62bf835eac7764339e43ac3d112ba76ffd38f4dbf89b0
          • Instruction Fuzzy Hash: 7FA17F32E00209CFCF15DFB5C84459EBBB2FF85300B15417AE816AB2A5DB75EA46DB40
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ce8cffdbf6129bb5a81359052097d8330d3e69afe380ed0cbc76c72e2b9df08e
          • Instruction ID: cfa2c88a3bcc3c4d15582436fe949583a2094db17e357e7aec0209c6868ba63b
          • Opcode Fuzzy Hash: ce8cffdbf6129bb5a81359052097d8330d3e69afe380ed0cbc76c72e2b9df08e
          • Instruction Fuzzy Hash: F47191B4E012189FDB04DFAAC58499EFBF2BF89310F28C16AD418EB255D734A941CF50
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 838f86ecb0bc825875a07a16de0b1207a28e51a85122457142115d0fba9d2596
          • Instruction ID: 0faf64f00a9b9f72a9a2d401f9fd53da052c14ae6d8121d366b036082fb3dcb6
          • Opcode Fuzzy Hash: 838f86ecb0bc825875a07a16de0b1207a28e51a85122457142115d0fba9d2596
          • Instruction Fuzzy Hash: 785190B5D002199FDF08DFEAD8446EEBBB6FF89311F14812AE419AB254DB345A46CB40
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 370954fe7c797082b7f1dc6d75dd8783d4431b6daac99990f329f7648b8b9fe7
          • Instruction ID: 7a3148b0f52fe92763b308976ba36615593f1d8d5002256c9c8728369745b92e
          • Opcode Fuzzy Hash: 370954fe7c797082b7f1dc6d75dd8783d4431b6daac99990f329f7648b8b9fe7
          • Instruction Fuzzy Hash: 31510CB4E042199FDB14CFA9C5805AEFBF2EF89301F248169D418AB35AD7319E41CFA1
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4b5f3c58cb2f2832ca5330062494853d3f88bfa79740b1e8a1561416e3aca8d3
          • Instruction ID: ba2ae7d6f37e6f437623f1143f75458436c4761f8447613af0da3c15223b6274
          • Opcode Fuzzy Hash: 4b5f3c58cb2f2832ca5330062494853d3f88bfa79740b1e8a1561416e3aca8d3
          • Instruction Fuzzy Hash: 955180B5E006189FDB08DFAAC98459EFBF2BF89311F14C16AD418EB359DB349942CB50
          Memory Dump Source
          • Source File: 00000000.00000002.2096907742.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77a0000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d1b2f7d7a4e375c7e67e05ff3be3dc86038be3cc5b17819ea7e051658debaf0f
          • Instruction ID: e8d1619b98f0d4fdbfac7850d97469603f936b0b04d14c5111ac4a4524981f5e
          • Opcode Fuzzy Hash: d1b2f7d7a4e375c7e67e05ff3be3dc86038be3cc5b17819ea7e051658debaf0f
          • Instruction Fuzzy Hash: 7541C3B5E046099FEB08DFEAD8446EEFBF6AF88310F14C52AD418AB254EB345945CF40

          Execution Graph

          Execution Coverage:7.4%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:68
          Total number of Limit Nodes:7
          execution_graph 15295 125d660 DuplicateHandle 15296 125d6f6 15295->15296 15297 125dd40 15298 125dd6e 15297->15298 15300 125dd97 15298->15300 15302 125de3f 15298->15302 15303 125d100 15298->15303 15301 125de3a KiUserCallbackDispatcher 15300->15301 15300->15302 15301->15302 15304 125d10b 15303->15304 15307 125d174 15304->15307 15306 125e355 15306->15300 15308 125d17f 15307->15308 15309 125e410 GetFocus 15308->15309 15310 125e409 15308->15310 15309->15310 15310->15306 15311 1256e48 15313 1256e56 15311->15313 15314 1256a34 15311->15314 15315 1256a3f 15314->15315 15318 1256a84 15315->15318 15317 1256f7d 15317->15313 15319 1256a8f 15318->15319 15322 1256ab4 15319->15322 15321 125705a 15321->15317 15323 1256abf 15322->15323 15326 1256ae4 15323->15326 15325 125714d 15325->15321 15327 1256aef 15326->15327 15329 12583b3 15327->15329 15332 125ac58 15327->15332 15328 12583f1 15328->15325 15329->15328 15336 125cd40 15329->15336 15341 125ac80 15332->15341 15345 125ac90 15332->15345 15333 125ac6e 15333->15329 15337 125cd71 15336->15337 15338 125cd95 15337->15338 15353 125cf00 15337->15353 15357 125ceef 15337->15357 15338->15328 15342 125ac90 15341->15342 15348 125ad88 15342->15348 15343 125ac9f 15343->15333 15347 125ad88 GetModuleHandleW 15345->15347 15346 125ac9f 15346->15333 15347->15346 15349 125adbc 15348->15349 15350 125ad99 15348->15350 15349->15343 15350->15349 15351 125afc0 GetModuleHandleW 15350->15351 15352 125afed 15351->15352 15352->15343 15354 125cf0d 15353->15354 15356 125cf47 15354->15356 15361 125b760 15354->15361 15356->15338 15358 125cf00 15357->15358 15359 125b760 GetModuleHandleW 15358->15359 15360 125cf47 15358->15360 15359->15360 15360->15338 15362 125b76b 15361->15362 15364 125dc58 15362->15364 15365 125d064 15362->15365 15366 125d06f 15365->15366 15367 1256ae4 GetModuleHandleW 15366->15367 15368 125dcc7 15367->15368 15368->15364 15369 125d418 15370 125d45e GetCurrentProcess 15369->15370 15372 125d4b0 GetCurrentThread 15370->15372 15373 125d4a9 15370->15373 15374 125d4e6 15372->15374 15375 125d4ed GetCurrentProcess 15372->15375 15373->15372 15374->15375 15376 125d523 15375->15376 15377 125d54b GetCurrentThreadId 15376->15377 15378 125d57c 15377->15378

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 526 125d408-125d4a7 GetCurrentProcess 530 125d4b0-125d4e4 GetCurrentThread 526->530 531 125d4a9-125d4af 526->531 532 125d4e6-125d4ec 530->532 533 125d4ed-125d521 GetCurrentProcess 530->533 531->530 532->533 535 125d523-125d529 533->535 536 125d52a-125d545 call 125d5e7 533->536 535->536 539 125d54b-125d57a GetCurrentThreadId 536->539 540 125d583-125d5e5 539->540 541 125d57c-125d582 539->541 541->540
          APIs
          • GetCurrentProcess.KERNEL32 ref: 0125D496
          • GetCurrentThread.KERNEL32 ref: 0125D4D3
          • GetCurrentProcess.KERNEL32 ref: 0125D510
          • GetCurrentThreadId.KERNEL32 ref: 0125D569
          Memory Dump Source
          • Source File: 00000004.00000002.3613486912.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_1250000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 4cc19c53f62106d725bb70814ecce445ea27f7e5121af9e68465bf0e74189630
          • Instruction ID: 523657191b5675bd37f22495a3cc9d330477dca146e0bd45b92f0325f6d54d9f
          • Opcode Fuzzy Hash: 4cc19c53f62106d725bb70814ecce445ea27f7e5121af9e68465bf0e74189630
          • Instruction Fuzzy Hash: 655167B09112498FDB44DFA9D588B9EBFF1EF48314F248059E509A7390D7389984CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 548 125d418-125d4a7 GetCurrentProcess 552 125d4b0-125d4e4 GetCurrentThread 548->552 553 125d4a9-125d4af 548->553 554 125d4e6-125d4ec 552->554 555 125d4ed-125d521 GetCurrentProcess 552->555 553->552 554->555 557 125d523-125d529 555->557 558 125d52a-125d545 call 125d5e7 555->558 557->558 561 125d54b-125d57a GetCurrentThreadId 558->561 562 125d583-125d5e5 561->562 563 125d57c-125d582 561->563 563->562
          APIs
          • GetCurrentProcess.KERNEL32 ref: 0125D496
          • GetCurrentThread.KERNEL32 ref: 0125D4D3
          • GetCurrentProcess.KERNEL32 ref: 0125D510
          • GetCurrentThreadId.KERNEL32 ref: 0125D569
          Memory Dump Source
          • Source File: 00000004.00000002.3613486912.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_1250000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 2d87235ff00d4e4a0e7389e928213cedefe3a7e0095478df29d43acb4aaf331c
          • Instruction ID: e4df690c81fa0b6bfaccca40df749ef63b0be4840c4dd201522b931666da76b4
          • Opcode Fuzzy Hash: 2d87235ff00d4e4a0e7389e928213cedefe3a7e0095478df29d43acb4aaf331c
          • Instruction Fuzzy Hash: FC5156B09113498FDB54DFAAD588B9EBFF1EF48314F208059E509A73A0D738A984CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 570 125ad88-125ad97 571 125adc3-125adc7 570->571 572 125ad99-125ada6 call 125a0e4 570->572 573 125adc9-125add3 571->573 574 125addb-125ae1c 571->574 579 125adbc 572->579 580 125ada8 572->580 573->574 581 125ae1e-125ae26 574->581 582 125ae29-125ae37 574->582 579->571 625 125adae call 125b020 580->625 626 125adae call 125b010 580->626 581->582 584 125ae39-125ae3e 582->584 585 125ae5b-125ae5d 582->585 583 125adb4-125adb6 583->579 586 125aef8-125afb8 583->586 588 125ae40-125ae47 call 125a0f0 584->588 589 125ae49 584->589 587 125ae60-125ae67 585->587 620 125afc0-125afeb GetModuleHandleW 586->620 621 125afba-125afbd 586->621 591 125ae74-125ae7b 587->591 592 125ae69-125ae71 587->592 590 125ae4b-125ae59 588->590 589->590 590->587 595 125ae7d-125ae85 591->595 596 125ae88-125ae91 call 125a100 591->596 592->591 595->596 601 125ae93-125ae9b 596->601 602 125ae9e-125aea3 596->602 601->602 603 125aea5-125aeac 602->603 604 125aec1-125aece 602->604 603->604 606 125aeae-125aebe call 125a110 call 125a120 603->606 611 125aef1-125aef7 604->611 612 125aed0-125aeee 604->612 606->604 612->611 622 125aff4-125b008 620->622 623 125afed-125aff3 620->623 621->620 623->622 625->583 626->583
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0125AFDE
          Memory Dump Source
          • Source File: 00000004.00000002.3613486912.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_1250000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 037a84da8b8affd283ab6b64c7a1115bbf643cd5f39368d0afd4b186202a508e
          • Instruction ID: 5e1cdf347eb256b9fcc882319a6a0b3b8ccdc7860edd506efa77066218356b0d
          • Opcode Fuzzy Hash: 037a84da8b8affd283ab6b64c7a1115bbf643cd5f39368d0afd4b186202a508e
          • Instruction Fuzzy Hash: 17717870A10B058FDB64DF29D48675ABBF5FF48300F008A2DD94AD7A50DB75E845CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 627 125d658-125d65a 628 125d660-125d6f4 DuplicateHandle 627->628 629 125d6f6-125d6fc 628->629 630 125d6fd-125d71a 628->630 629->630
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0125D6E7
          Memory Dump Source
          • Source File: 00000004.00000002.3613486912.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_1250000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 18652d3f962b132552d4eec106dc899b184495749b6fa2b19bad2f0dec03b3e7
          • Instruction ID: e0fdd1bcb3f3512b4d2ea38d5200240762890c3439628f2cc9af3ef2624d1009
          • Opcode Fuzzy Hash: 18652d3f962b132552d4eec106dc899b184495749b6fa2b19bad2f0dec03b3e7
          • Instruction Fuzzy Hash: C121E3B5900249EFDB10CFAAD584ADEBFF9EB48310F14845AE918A7350C379A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 633 125d660-125d6f4 DuplicateHandle 634 125d6f6-125d6fc 633->634 635 125d6fd-125d71a 633->635 634->635
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0125D6E7
          Memory Dump Source
          • Source File: 00000004.00000002.3613486912.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_1250000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 03076279fb69f218f3344b8a04dbf6113546255aa61b950bbdf019abeeae4ceb
          • Instruction ID: af69f9070f3d8a3fec229d924f3727a0114fd93e153b58761d1438c7c6c3ad9f
          • Opcode Fuzzy Hash: 03076279fb69f218f3344b8a04dbf6113546255aa61b950bbdf019abeeae4ceb
          • Instruction Fuzzy Hash: 0E21B0B5900249DFDB10CFAAD984ADEBBF9EB48310F14841AE918A7350D378A945CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 638 125af78-125afb8 639 125afc0-125afeb GetModuleHandleW 638->639 640 125afba-125afbd 638->640 641 125aff4-125b008 639->641 642 125afed-125aff3 639->642 640->639 642->641
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0125AFDE
          Memory Dump Source
          • Source File: 00000004.00000002.3613486912.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_1250000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 330fbe333607ab6a3bea8c0c70b3e256c67bd79019dc656dec11d46c587478d4
          • Instruction ID: f0e86683edae1ebe61db59cf92cf40267824c255b35952728caf4eb40b0e6b5b
          • Opcode Fuzzy Hash: 330fbe333607ab6a3bea8c0c70b3e256c67bd79019dc656dec11d46c587478d4
          • Instruction Fuzzy Hash: 3A11E0B5C007498FDB10DF9AC484ADEFBF4EF88314F10855AD929A7650C379A545CFA1
          Memory Dump Source
          • Source File: 00000004.00000002.3611389968.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_f6d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 743f772eac193c1f234e4a12f538c0f4aff40702b11c713499a2271d6fb90da7
          • Instruction ID: b97a1a8aafcf13c0a03dd82a6fe71fa209d5e028e717f9d68cff9ef1341db9ea
          • Opcode Fuzzy Hash: 743f772eac193c1f234e4a12f538c0f4aff40702b11c713499a2271d6fb90da7
          • Instruction Fuzzy Hash: 80212572A04244DFCB05DF14D9C0F26BF65FB98324F20C569E9090B256C73AE856E7A2
          Memory Dump Source
          • Source File: 00000004.00000002.3611457886.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_f7d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c4903fe81c9da2b521570f479b18e256b2226b8c61cab66037606eaaf31d4d3b
          • Instruction ID: 04873e7fc1ba613dc56e66e47ef14dbedc7b5fa55678d38fb5085eb3793e948c
          • Opcode Fuzzy Hash: c4903fe81c9da2b521570f479b18e256b2226b8c61cab66037606eaaf31d4d3b
          • Instruction Fuzzy Hash: 4A21D075604204DFCB14DF24D984B26BB75EF88324F64C56ED90E4B29AC33AD806EA62
          Memory Dump Source
          • Source File: 00000004.00000002.3611457886.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_f7d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 70f145368555bf9039fd3a0b837a428f0fe2856f5858cace0325a4754459a60f
          • Instruction ID: 18c885caed0c909fa5b30e92ea43077c9e44418e3e64f819e636502ea98367db
          • Opcode Fuzzy Hash: 70f145368555bf9039fd3a0b837a428f0fe2856f5858cace0325a4754459a60f
          • Instruction Fuzzy Hash: A22150755093808FDB12CF24D994715BF71EF46314F28C5EBD8498B6A7C33A980ADB62
          Memory Dump Source
          • Source File: 00000004.00000002.3611389968.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_f6d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: 73cde9a067073f6d29ad25b3ac3217c42fc6554b8e58c3b24d95ba6d1eb72699
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: 3B11E676904280CFCB16CF10D5C4B16BF71FB94324F24C5A9D9490B656C336E85ADBA2

          Execution Graph

          Execution Coverage:10.7%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:181
          Total number of Limit Nodes:5
          execution_graph 27668 7641b00 27669 7641b1c 27668->27669 27672 7642a27 27669->27672 27670 7641bc6 27673 7642a4a 27672->27673 27677 7642a68 27673->27677 27681 7642a78 27673->27681 27674 7642a5e 27674->27670 27678 7642a78 27677->27678 27685 7642b39 27678->27685 27682 7642a92 27681->27682 27684 7642b39 2 API calls 27682->27684 27683 7642ab5 27683->27674 27684->27683 27686 7642b6c 27685->27686 27690 7642ca0 27686->27690 27694 7642ca8 27686->27694 27687 7642ab5 27687->27674 27691 7642ca8 NtQueryInformationProcess 27690->27691 27693 7642d36 27691->27693 27693->27687 27695 7642cf3 NtQueryInformationProcess 27694->27695 27696 7642d36 27695->27696 27696->27687 27697 32128c8 27699 32128cd 27697->27699 27698 3212a53 27699->27698 27702 3212b47 PostMessageW 27699->27702 27704 3212b48 PostMessageW 27699->27704 27703 3212bb4 27702->27703 27703->27699 27705 3212bb4 27704->27705 27705->27699 27706 1834668 27707 183467a 27706->27707 27708 1834686 27707->27708 27710 1834778 27707->27710 27711 183479d 27710->27711 27715 1834879 27711->27715 27719 1834888 27711->27719 27717 18348af 27715->27717 27716 183498c 27716->27716 27717->27716 27723 18344c4 27717->27723 27721 18348af 27719->27721 27720 183498c 27720->27720 27721->27720 27722 18344c4 CreateActCtxA 27721->27722 27722->27720 27724 1835918 CreateActCtxA 27723->27724 27726 18359db 27724->27726 27884 183b3b8 27885 183b400 GetModuleHandleW 27884->27885 27886 183b3fa 27884->27886 27887 183b42d 27885->27887 27886->27885 27888 183d178 27889 183d1be 27888->27889 27893 183d347 27889->27893 27896 183d358 27889->27896 27890 183d2ab 27899 183b388 27893->27899 27897 183d386 27896->27897 27898 183b388 DuplicateHandle 27896->27898 27897->27890 27898->27897 27900 183d3c0 DuplicateHandle 27899->27900 27901 183d386 27900->27901 27901->27890 27656 7643778 27658 7643788 27656->27658 27660 7643394 27658->27660 27664 76433a0 27658->27664 27661 7644080 OutputDebugStringW 27660->27661 27663 76440ff 27661->27663 27663->27658 27665 7644130 CloseHandle 27664->27665 27667 764419e 27665->27667 27667->27658 27727 321090e 27728 3210913 27727->27728 27729 32108c3 27727->27729 27732 3211728 27728->27732 27749 3211718 27728->27749 27733 3211742 27732->27733 27766 3211d0e 27733->27766 27771 32121ef 27733->27771 27775 321200c 27733->27775 27782 3211daa 27733->27782 27786 3212229 27733->27786 27790 32124c6 27733->27790 27794 3212107 27733->27794 27799 3211ce5 27733->27799 27804 3212121 27733->27804 27809 3211e61 27733->27809 27814 3211bdc 27733->27814 27820 3211e18 27733->27820 27825 3211a39 27733->27825 27831 321226e 27733->27831 27734 3211766 27734->27729 27750 3211728 27749->27750 27752 3211e61 2 API calls 27750->27752 27753 3212121 2 API calls 27750->27753 27754 3211ce5 2 API calls 27750->27754 27755 3212107 2 API calls 27750->27755 27756 32124c6 2 API calls 27750->27756 27757 3212229 2 API calls 27750->27757 27758 3211daa 2 API calls 27750->27758 27759 321200c 4 API calls 27750->27759 27760 32121ef 2 API calls 27750->27760 27761 3211d0e 2 API calls 27750->27761 27762 321226e 2 API calls 27750->27762 27763 3211a39 2 API calls 27750->27763 27764 3211e18 2 API calls 27750->27764 27765 3211bdc 2 API calls 27750->27765 27751 3211766 27751->27729 27752->27751 27753->27751 27754->27751 27755->27751 27756->27751 27757->27751 27758->27751 27759->27751 27760->27751 27761->27751 27762->27751 27763->27751 27764->27751 27765->27751 27767 3211d14 27766->27767 27836 32102c0 27767->27836 27840 32102c8 27767->27840 27768 3211dd6 27768->27734 27844 3210040 27771->27844 27848 3210007 27771->27848 27772 3212209 27852 3210111 27775->27852 27856 3210118 27775->27856 27776 321202a 27860 32101d0 27776->27860 27864 32101d8 27776->27864 27777 3212407 27783 3211dd6 27782->27783 27784 32102c0 ReadProcessMemory 27782->27784 27785 32102c8 ReadProcessMemory 27782->27785 27783->27734 27784->27783 27785->27783 27788 3210040 Wow64SetThreadContext 27786->27788 27789 3210007 Wow64SetThreadContext 27786->27789 27787 3212243 27788->27787 27789->27787 27792 32101d0 WriteProcessMemory 27790->27792 27793 32101d8 WriteProcessMemory 27790->27793 27791 32124ea 27792->27791 27793->27791 27795 321210d 27794->27795 27797 32101d0 WriteProcessMemory 27795->27797 27798 32101d8 WriteProcessMemory 27795->27798 27796 3212407 27797->27796 27798->27796 27800 3211d08 27799->27800 27802 32101d0 WriteProcessMemory 27800->27802 27803 32101d8 WriteProcessMemory 27800->27803 27801 321262a 27802->27801 27803->27801 27805 3212127 27804->27805 27868 764fa8b 27805->27868 27872 764fa90 27805->27872 27806 321249c 27810 3211d25 27809->27810 27812 32102c0 ReadProcessMemory 27810->27812 27813 32102c8 ReadProcessMemory 27810->27813 27811 3211dd6 27811->27734 27812->27811 27813->27811 27816 3211b1a 27814->27816 27815 3211bf8 27815->27734 27816->27815 27876 3210460 27816->27876 27880 3210454 27816->27880 27821 3211e29 27820->27821 27823 764fa90 ResumeThread 27821->27823 27824 764fa8b ResumeThread 27821->27824 27822 321249c 27823->27822 27824->27822 27827 3211a7b 27825->27827 27826 3211bf8 27826->27734 27827->27826 27829 3210460 CreateProcessA 27827->27829 27830 3210454 CreateProcessA 27827->27830 27828 3211c74 27828->27734 27829->27828 27830->27828 27832 3212274 27831->27832 27834 764fa90 ResumeThread 27832->27834 27835 764fa8b ResumeThread 27832->27835 27833 321249c 27834->27833 27835->27833 27837 3210313 ReadProcessMemory 27836->27837 27839 3210357 27837->27839 27839->27768 27841 3210313 ReadProcessMemory 27840->27841 27843 3210357 27841->27843 27843->27768 27845 3210085 Wow64SetThreadContext 27844->27845 27847 32100cd 27845->27847 27847->27772 27849 3210040 Wow64SetThreadContext 27848->27849 27851 32100cd 27849->27851 27851->27772 27853 3210158 VirtualAllocEx 27852->27853 27855 3210195 27853->27855 27855->27776 27857 3210158 VirtualAllocEx 27856->27857 27859 3210195 27857->27859 27859->27776 27861 32101d8 WriteProcessMemory 27860->27861 27863 3210277 27861->27863 27863->27777 27865 3210220 WriteProcessMemory 27864->27865 27867 3210277 27865->27867 27867->27777 27869 764fa90 ResumeThread 27868->27869 27871 764fb01 27869->27871 27871->27806 27873 764fad0 ResumeThread 27872->27873 27875 764fb01 27873->27875 27875->27806 27877 32104e9 CreateProcessA 27876->27877 27879 32106ab 27877->27879 27881 3210460 CreateProcessA 27880->27881 27883 32106ab 27881->27883
          APIs
          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 07642D27
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: InformationProcessQuery
          • String ID:
          • API String ID: 1778838933-0
          • Opcode ID: d79d75cac3f333c8d5c867ca9896b4944028b6a6bc01ee595279273b75190a4d
          • Instruction ID: 03d172b0bd2daa5ac823f3a4200989b18ff586c3cc6ed6b55213a885667741d3
          • Opcode Fuzzy Hash: d79d75cac3f333c8d5c867ca9896b4944028b6a6bc01ee595279273b75190a4d
          • Instruction Fuzzy Hash: 8221EFB5900249EFCB10DF9AD885ADEFBF4FF49310F20842AE919A7210D774A940CFA5
          APIs
          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 07642D27
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: InformationProcessQuery
          • String ID:
          • API String ID: 1778838933-0
          • Opcode ID: bb5601c985592adfc2a1864ef6d86d0af8186f2c2e1a11a6db5e0bffbec1feb6
          • Instruction ID: 8bcf104119c8059ae322dab93f20a9723ed0689a68daf1d648492eb6e79c5655
          • Opcode Fuzzy Hash: bb5601c985592adfc2a1864ef6d86d0af8186f2c2e1a11a6db5e0bffbec1feb6
          • Instruction Fuzzy Hash: 4321CEB5900259DFCB10DF9AD884ADEFBF4FF49310F20842AE919A7210D379A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 317 3210454-32104f5 320 32104f7-3210501 317->320 321 321052e-321054e 317->321 320->321 322 3210503-3210505 320->322 328 3210550-321055a 321->328 329 3210587-32105b6 321->329 323 3210507-3210511 322->323 324 3210528-321052b 322->324 326 3210513 323->326 327 3210515-3210524 323->327 324->321 326->327 327->327 330 3210526 327->330 328->329 331 321055c-321055e 328->331 335 32105b8-32105c2 329->335 336 32105ef-32106a9 CreateProcessA 329->336 330->324 333 3210581-3210584 331->333 334 3210560-321056a 331->334 333->329 337 321056c 334->337 338 321056e-321057d 334->338 335->336 339 32105c4-32105c6 335->339 349 32106b2-3210738 336->349 350 32106ab-32106b1 336->350 337->338 338->338 340 321057f 338->340 341 32105e9-32105ec 339->341 342 32105c8-32105d2 339->342 340->333 341->336 344 32105d4 342->344 345 32105d6-32105e5 342->345 344->345 345->345 346 32105e7 345->346 346->341 360 3210748-321074c 349->360 361 321073a-321073e 349->361 350->349 362 321075c-3210760 360->362 363 321074e-3210752 360->363 361->360 364 3210740 361->364 366 3210770-3210774 362->366 367 3210762-3210766 362->367 363->362 365 3210754 363->365 364->360 365->362 369 3210786-321078d 366->369 370 3210776-321077c 366->370 367->366 368 3210768 367->368 368->366 371 32107a4 369->371 372 321078f-321079e 369->372 370->369 373 32107a5 371->373 372->371 373->373
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 03210696
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: b489c64564dc35d6c936f824a794a496e00440f8726e58cdcf3007107ce6d410
          • Instruction ID: a4a13896d194e87eda3c5d7672796feac878c132c2afc8fee76f39b9db9a1c2f
          • Opcode Fuzzy Hash: b489c64564dc35d6c936f824a794a496e00440f8726e58cdcf3007107ce6d410
          • Instruction Fuzzy Hash: A0A149B1D1021ADFDB10CF68C940BADBBF2BF48310F1481AAE809A7284DB7599D5CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 375 3210460-32104f5 377 32104f7-3210501 375->377 378 321052e-321054e 375->378 377->378 379 3210503-3210505 377->379 385 3210550-321055a 378->385 386 3210587-32105b6 378->386 380 3210507-3210511 379->380 381 3210528-321052b 379->381 383 3210513 380->383 384 3210515-3210524 380->384 381->378 383->384 384->384 387 3210526 384->387 385->386 388 321055c-321055e 385->388 392 32105b8-32105c2 386->392 393 32105ef-32106a9 CreateProcessA 386->393 387->381 390 3210581-3210584 388->390 391 3210560-321056a 388->391 390->386 394 321056c 391->394 395 321056e-321057d 391->395 392->393 396 32105c4-32105c6 392->396 406 32106b2-3210738 393->406 407 32106ab-32106b1 393->407 394->395 395->395 397 321057f 395->397 398 32105e9-32105ec 396->398 399 32105c8-32105d2 396->399 397->390 398->393 401 32105d4 399->401 402 32105d6-32105e5 399->402 401->402 402->402 403 32105e7 402->403 403->398 417 3210748-321074c 406->417 418 321073a-321073e 406->418 407->406 419 321075c-3210760 417->419 420 321074e-3210752 417->420 418->417 421 3210740 418->421 423 3210770-3210774 419->423 424 3210762-3210766 419->424 420->419 422 3210754 420->422 421->417 422->419 426 3210786-321078d 423->426 427 3210776-321077c 423->427 424->423 425 3210768 424->425 425->423 428 32107a4 426->428 429 321078f-321079e 426->429 427->426 430 32107a5 428->430 429->428 430->430
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 03210696
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 89616acc3c23c739e1b9116b58aecd139d9c067e0701d81a50023d944ab6258e
          • Instruction ID: 15206c9d52f8527cc40a2999b7d36935213a9aa31b6af9f95d84df68cb91a6a6
          • Opcode Fuzzy Hash: 89616acc3c23c739e1b9116b58aecd139d9c067e0701d81a50023d944ab6258e
          • Instruction Fuzzy Hash: 85914AB1D1021ADFDB14CF68C940BADBBF2BF48310F1481AAE809A7294DB7599D5CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 540 18344c4-18359d9 CreateActCtxA 543 18359e2-1835a3c 540->543 544 18359db-18359e1 540->544 551 1835a4b-1835a4f 543->551 552 1835a3e-1835a41 543->552 544->543 553 1835a51-1835a5d 551->553 554 1835a60 551->554 552->551 553->554 555 1835a61 554->555 555->555
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 018359C9
          Memory Dump Source
          • Source File: 0000000A.00000002.2132460575.0000000001830000.00000040.00000800.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_1830000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 182ed9fece17880f68bd8ba8c748771c46a64a3e04b602c70158b1d3905a34ed
          • Instruction ID: 478ea9ec979b4bb0e6ba01437ad0f8d173f5fdbeb86c82af1931caf39058932b
          • Opcode Fuzzy Hash: 182ed9fece17880f68bd8ba8c748771c46a64a3e04b602c70158b1d3905a34ed
          • Instruction Fuzzy Hash: C441D2B0C0071DCBDB24DFA9C884B9DBBF5BF89304F24806AD418AB255DB756A46CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 557 183590d-18359d9 CreateActCtxA 559 18359e2-1835a3c 557->559 560 18359db-18359e1 557->560 567 1835a4b-1835a4f 559->567 568 1835a3e-1835a41 559->568 560->559 569 1835a51-1835a5d 567->569 570 1835a60 567->570 568->567 569->570 571 1835a61 570->571 571->571
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 018359C9
          Memory Dump Source
          • Source File: 0000000A.00000002.2132460575.0000000001830000.00000040.00000800.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_1830000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 0127711548fee904f6fc89fdf0d321861c0adc2f32516fa8f7b2471e6191ba03
          • Instruction ID: a18ae18b9e8eaaf518ed6e542eb1c9fe0f50c38b8ebb729a54d70be64692f797
          • Opcode Fuzzy Hash: 0127711548fee904f6fc89fdf0d321861c0adc2f32516fa8f7b2471e6191ba03
          • Instruction Fuzzy Hash: 0441C0B0C00719CBDB24DFA9C984B9DBBF5BF49304F24806AD418AB255DB756A46CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 573 3210007-321008b 576 321009b-32100cb Wow64SetThreadContext 573->576 577 321008d-3210099 573->577 579 32100d4-3210104 576->579 580 32100cd-32100d3 576->580 577->576 580->579
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 032100BE
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 8c9e5e9e47e4b6456b478b3af1164720dda202cb77ebb35adac0401490accbd9
          • Instruction ID: 3be91ce1f815b4c3e184bdf94d2d0855fde2899b62e68c0a949d12e20c1efede
          • Opcode Fuzzy Hash: 8c9e5e9e47e4b6456b478b3af1164720dda202cb77ebb35adac0401490accbd9
          • Instruction Fuzzy Hash: BF31A4718083888FCB11CFA9C8847EEBFF4EF46314F1984AAD444AB252D7389544CFA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 584 32101d0-3210226 587 3210236-3210275 WriteProcessMemory 584->587 588 3210228-3210234 584->588 590 3210277-321027d 587->590 591 321027e-32102ae 587->591 588->587 590->591
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 03210268
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 8227acf66fc8a208cda04a0ca745beef64284e247ff6bc1d50ee15fb0b4de76f
          • Instruction ID: 131975ca0ec8af2f4c69ab22a8e426889697ff50f32f902fa26305a503842320
          • Opcode Fuzzy Hash: 8227acf66fc8a208cda04a0ca745beef64284e247ff6bc1d50ee15fb0b4de76f
          • Instruction Fuzzy Hash: C42139719003499FCB10DFA9C985BDEBBF5FF48310F10842AE919A7240D7789594CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 595 32101d8-3210226 597 3210236-3210275 WriteProcessMemory 595->597 598 3210228-3210234 595->598 600 3210277-321027d 597->600 601 321027e-32102ae 597->601 598->597 600->601
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 03210268
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 17b7eec65ebb074eff0c4bef0d49dc2090c283d4b805aea62a9e5a07592e2073
          • Instruction ID: 8e96d10827cdcbd2a8730dd0ed1f71a6b622220a9c0222b5d6ca622472a24a6c
          • Opcode Fuzzy Hash: 17b7eec65ebb074eff0c4bef0d49dc2090c283d4b805aea62a9e5a07592e2073
          • Instruction Fuzzy Hash: CB212A719003099FCB10DFAAC945BDEFBF5FF48310F10842AE919A7240D7789994CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 605 32102c0-3210355 ReadProcessMemory 608 3210357-321035d 605->608 609 321035e-321038e 605->609 608->609
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 03210348
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: 22ade95587ed85bb9be94335e5efe5a6172d1911b050f916c81fb9c6ad57067e
          • Instruction ID: 64a38beed63c0091e131c68e5d41307733f83d084bd713b4bb436602ad527b5d
          • Opcode Fuzzy Hash: 22ade95587ed85bb9be94335e5efe5a6172d1911b050f916c81fb9c6ad57067e
          • Instruction Fuzzy Hash: 722145B18003499FDB10DFAAC980BEEFBF5FF48320F50842AE519A7250D7399940CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 613 183b388-183d454 DuplicateHandle 615 183d456-183d45c 613->615 616 183d45d-183d47a 613->616 615->616
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0183D386,?,?,?,?,?), ref: 0183D447
          Memory Dump Source
          • Source File: 0000000A.00000002.2132460575.0000000001830000.00000040.00000800.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_1830000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 3e3e7380ec381ee38ea36a087c8759368137747f6cd97e08390ef9558826166f
          • Instruction ID: d603dcc0e4aaf9b8dc0f90a83cab07933c477c8fcd022223a47eb93a5045c9a0
          • Opcode Fuzzy Hash: 3e3e7380ec381ee38ea36a087c8759368137747f6cd97e08390ef9558826166f
          • Instruction Fuzzy Hash: 4E21E4B59002489FDB10CF9AD984AEEBFF9FF48310F14841AE918A3311D378A954CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 629 32102c8-3210355 ReadProcessMemory 632 3210357-321035d 629->632 633 321035e-321038e 629->633 632->633
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 03210348
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: 0e5e4facb2216bb3a84ef29ea0ff91e2903c47b893f7d441ce405644a1bbfda8
          • Instruction ID: 83224a0d134418ce0db0053c49a11f6156550eb7b5d7a41fb3a3600b7ef529e7
          • Opcode Fuzzy Hash: 0e5e4facb2216bb3a84ef29ea0ff91e2903c47b893f7d441ce405644a1bbfda8
          • Instruction Fuzzy Hash: 5B213AB1C003499FCB10DFAAC940AEEFBF5FF48310F10842AE519A7250D7789540CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 619 3210040-321008b 621 321009b-32100cb Wow64SetThreadContext 619->621 622 321008d-3210099 619->622 624 32100d4-3210104 621->624 625 32100cd-32100d3 621->625 622->621 625->624
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 032100BE
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 44c3e49338488316ffb05bbc81e5989aa7e331568a69f8758e6913c54c248d31
          • Instruction ID: b8657810eac8e1eff161d5ef452c7ced1bf12b3e3fa6292fb6d4194ff7685ebc
          • Opcode Fuzzy Hash: 44c3e49338488316ffb05bbc81e5989aa7e331568a69f8758e6913c54c248d31
          • Instruction Fuzzy Hash: 67211871D002098FDB10DFAAC5857EEBBF4EF58324F14842AD559A7240DB79A984CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 637 183d3b8-183d454 DuplicateHandle 638 183d456-183d45c 637->638 639 183d45d-183d47a 637->639 638->639
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0183D386,?,?,?,?,?), ref: 0183D447
          Memory Dump Source
          • Source File: 0000000A.00000002.2132460575.0000000001830000.00000040.00000800.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_1830000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 7518e5135c3d856a9431f9b00ad664590ce4485686fce571008172291826c784
          • Instruction ID: fdb82b2a18d3d1cc24454c55ee1f9b4de348b34732bb1959bf893343bf192fb3
          • Opcode Fuzzy Hash: 7518e5135c3d856a9431f9b00ad664590ce4485686fce571008172291826c784
          • Instruction Fuzzy Hash: 5B21C2B5D002099FDB10CFAAD584AEEBBF5FF48310F14841AE918A3350D378AA44CFA5
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 03210186
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 4af943ab845ca1cb1badf89921fd0e53eef684e8fcc1d19d59018c43a6ed725c
          • Instruction ID: 7dd52811c1bfeb5f58c0890f0ebbe7376839373ff03098e9be17444225335120
          • Opcode Fuzzy Hash: 4af943ab845ca1cb1badf89921fd0e53eef684e8fcc1d19d59018c43a6ed725c
          • Instruction Fuzzy Hash: 40214A718002499FCB10DFAAD845AEEBBF5FF88310F24841AD519A7250CB79A550CFA0
          APIs
          • OutputDebugStringW.KERNELBASE(00000000), ref: 076440F0
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DebugOutputString
          • String ID:
          • API String ID: 1166629820-0
          • Opcode ID: 270fe124284982b5a08a6c4faf7c8509b821ddae97927f5ba8bf8ca381fc725e
          • Instruction ID: 02cc9843b8be5d2270faf7388f752d8d18d3e8a7c3390b37964649f5aa9b61a8
          • Opcode Fuzzy Hash: 270fe124284982b5a08a6c4faf7c8509b821ddae97927f5ba8bf8ca381fc725e
          • Instruction Fuzzy Hash: DB1144B1C0029A9BCB10DFAAD445B9EFBB4FF48310F10812AD819A3200D775A554CFA5
          APIs
          • OutputDebugStringW.KERNELBASE(00000000), ref: 076440F0
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DebugOutputString
          • String ID:
          • API String ID: 1166629820-0
          • Opcode ID: e9037433a5e6943ce2cde0ead73bf7d21a5b115db8771e7f209334296621d349
          • Instruction ID: e3ec08725b605f5476f09cfb7ba9e402e4e80117d13698d90ab7954247ab0bf2
          • Opcode Fuzzy Hash: e9037433a5e6943ce2cde0ead73bf7d21a5b115db8771e7f209334296621d349
          • Instruction Fuzzy Hash: BA1142B1C0065A9BCB10CF9AD445BAEFBB4FF49710F10812AD819B7240D778A910CFA4
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 03210186
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 8cb0035f3a5294b7f4f8b26b9ea1f4ad28e01ca4c1de66df61af62099abfd338
          • Instruction ID: ebab3df33eaa964ba2f809bdd26679d51919717bf32d7f44e660c3292728737b
          • Opcode Fuzzy Hash: 8cb0035f3a5294b7f4f8b26b9ea1f4ad28e01ca4c1de66df61af62099abfd338
          • Instruction Fuzzy Hash: 831137718002499FCB10DFAAC944AEFBFF5EF48320F14841AE519A7250CB79A990CFA0
          APIs
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: c8dcbec58ddeeee5e8e99f5a12367f50f775cfffe5552128ac44b1999c07d635
          • Instruction ID: e49dfdb3f5a88f2c5c22b0c1c6e5ccb39b400ef7e1cd1f9b938acd84467540d0
          • Opcode Fuzzy Hash: c8dcbec58ddeeee5e8e99f5a12367f50f775cfffe5552128ac44b1999c07d635
          • Instruction Fuzzy Hash: 8E1158B1C003488FCB20DFAAD4447EEFBF5EF89320F24841AD419A7240CB78A944CBA4
          APIs
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: 019f5ebe8e0336d43f45d9bd6df31c3994a1374bb714443ee1c37c794cb0d60f
          • Instruction ID: 5841a4d2b8efff0ea23af17348775fdf77694bd496c3bc1da5b255818a181254
          • Opcode Fuzzy Hash: 019f5ebe8e0336d43f45d9bd6df31c3994a1374bb714443ee1c37c794cb0d60f
          • Instruction Fuzzy Hash: 0B113AB1D002498FDB10DFAAC4457EFFBF5EF89320F24841AD519A7240CB79A544CBA4
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0183B41E
          Memory Dump Source
          • Source File: 0000000A.00000002.2132460575.0000000001830000.00000040.00000800.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_1830000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: b31a31ad7263b396ee9c0534fb461b00a2c688891936fda8340b2bc8f7dc6573
          • Instruction ID: c5fa312630971e8203f50e09478050d22f95e502ca4376fdc244fe55885757ea
          • Opcode Fuzzy Hash: b31a31ad7263b396ee9c0534fb461b00a2c688891936fda8340b2bc8f7dc6573
          • Instruction Fuzzy Hash: 0711E0B5C002498FDB10DF9AD444ADEFBF4EF88314F14842AD519A7210D379A645CFA5
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 03212BA5
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 2566db05e0f4c1685eb5da9b6469a5be4fdaf7e85b4671198f6264bc5ba67ed6
          • Instruction ID: 986890c1eb9614273b8541afc85d073cc3a6fcd4cae620d2e7d1c43bfc8b8bab
          • Opcode Fuzzy Hash: 2566db05e0f4c1685eb5da9b6469a5be4fdaf7e85b4671198f6264bc5ba67ed6
          • Instruction Fuzzy Hash: 1511F2B5800249DFDB20CF99D585BDEBBF4FB48310F10841AE918A3200C379A584CFA0
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 03212BA5
          Memory Dump Source
          • Source File: 0000000A.00000002.2134841501.0000000003210000.00000040.00000800.00020000.00000000.sdmp, Offset: 03210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_3210000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 524ef372efd5ba0d1a811d346a629ccc3288293c640b27c53543d66493e7e57a
          • Instruction ID: acb0080f7a60e2a02148bec26d63fcf927fc7bc0d830213f35003a20589393ae
          • Opcode Fuzzy Hash: 524ef372efd5ba0d1a811d346a629ccc3288293c640b27c53543d66493e7e57a
          • Instruction Fuzzy Hash: A211C2B58003499FDB10DF9AD585BDEBBF8EB48310F10845AE958A7200D379A584CFA5
          APIs
          • CloseHandle.KERNELBASE(00000000), ref: 0764418F
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 5f9689b9382e9767ffdd9b9758055f97474dc4ca4dccab1f6cfe44475969e123
          • Instruction ID: 176e133cf7a8d0de87e19feda3a51c03fbc2fbda80a5959367ad17b527083b8b
          • Opcode Fuzzy Hash: 5f9689b9382e9767ffdd9b9758055f97474dc4ca4dccab1f6cfe44475969e123
          • Instruction Fuzzy Hash: EF1125B18002498FDB10DF9AD445BEEFFF8EF49320F20846AE559A7241D778A944CFA5
          APIs
          • CloseHandle.KERNELBASE(00000000), ref: 0764418F
          Memory Dump Source
          • Source File: 0000000A.00000002.2156998776.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_7640000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 11089bde84e1d0f1f851ad19c0e212036071deb884a09a27ef5fdcc60b3ba119
          • Instruction ID: 1dae3f63aec3aa864a873df0033e15010ae832d3a9354615624f078fa9417d25
          • Opcode Fuzzy Hash: 11089bde84e1d0f1f851ad19c0e212036071deb884a09a27ef5fdcc60b3ba119
          • Instruction Fuzzy Hash: 0B1113B18002898FDB20DF9AC445BEEFBF8EF49324F20846AD559A3241D779A544CFA5
          Memory Dump Source
          • Source File: 0000000A.00000002.2128691839.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_154d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bfe8f55ab2d090857095bd98216287bb1184531026dc9092bedd3ff5df98d976
          • Instruction ID: 368fe2969e93a06339488a94609c9af69e0a1f84a032f47c744d0f6a5348a17c
          • Opcode Fuzzy Hash: bfe8f55ab2d090857095bd98216287bb1184531026dc9092bedd3ff5df98d976
          • Instruction Fuzzy Hash: 5D210671500204DFDB05DF58D9C0B5ABFB5FBA8328F20C569E9090F256C37AE456C6A1
          Memory Dump Source
          • Source File: 0000000A.00000002.2128751584.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_155d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5c47d6ae557fd60164b3b7cdf52a24cc8de0335336ea051199ec6143ac52e045
          • Instruction ID: af4f26353bb64c781164918730dcd1fe128f9bc4d3749ad4af0c4f6a5ae962f4
          • Opcode Fuzzy Hash: 5c47d6ae557fd60164b3b7cdf52a24cc8de0335336ea051199ec6143ac52e045
          • Instruction Fuzzy Hash: D9212572504200DFDB45DF98C5D0B26BBB5FB84324F20C96EDD094F252C33AD446CA61
          Memory Dump Source
          • Source File: 0000000A.00000002.2128751584.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_155d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 84ecd727eb3786c7c4b93904c042700b9f1dad8b7384da6c63bde78b38629b61
          • Instruction ID: eead40d9fd96753997b3fa31f4272bc3c8dbacc3789675f3b5cd858bb5d7163b
          • Opcode Fuzzy Hash: 84ecd727eb3786c7c4b93904c042700b9f1dad8b7384da6c63bde78b38629b61
          • Instruction Fuzzy Hash: 04210372504204DFDB55DF68D590B2ABFB5FB84314F20C96ADD094F266D33AD407CA61
          Memory Dump Source
          • Source File: 0000000A.00000002.2128751584.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_155d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3657610681940f2db977295645099b3b88bea93d6aab997b527742ab7d2e757c
          • Instruction ID: f640c180fb3b4f341dfdf355bd468782f3dc2e0cb0548de280b9fa845f33b5b1
          • Opcode Fuzzy Hash: 3657610681940f2db977295645099b3b88bea93d6aab997b527742ab7d2e757c
          • Instruction Fuzzy Hash: 292180755083849FDB03CF64D994B15BF71FB46214F28C5EAD8498F2A7D33A980ACB62
          Memory Dump Source
          • Source File: 0000000A.00000002.2128691839.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_154d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: 3b1f1f329560a549899f9c1e88231689580b5190ef5cf3c30767f192de3aa7ec
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: 9711CD76404240CFDB02CF54D5C4B5ABF71FB94224F24C6A9D9090A256C33AE45ACBA2
          Memory Dump Source
          • Source File: 0000000A.00000002.2128751584.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_155d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction ID: 68922cb4274a94e484c2cd00c5ecffac5ad6f029940c0411ec924a9855b1202a
          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction Fuzzy Hash: 7011A976504280DFDB42CF54C5D4B19BBB1FB84224F24C6AADC494B696C33AD44ACB62
          Memory Dump Source
          • Source File: 0000000A.00000002.2128691839.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_154d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4681a7e25216d889fc0c3f65dffc4619b378bf90a5f8a8ae6849c54f45d32281
          • Instruction ID: ec3e2b4a746db78e23d22ae50c62383e7c772eade5e568fe390d32b5c0c146be
          • Opcode Fuzzy Hash: 4681a7e25216d889fc0c3f65dffc4619b378bf90a5f8a8ae6849c54f45d32281
          • Instruction Fuzzy Hash: 8801A7710053849BE720CA99DD84B67BFF8FF56728F18C86AED090E287C2799840C671
          Memory Dump Source
          • Source File: 0000000A.00000002.2128691839.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_10_2_154d000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f2bdbcf8902d8d29b3779636cf71fa18ea3bcdcf985454658ec8d31a4a77c111
          • Instruction ID: 524daa9231b9c4555707383bd3f94fdf682294b3449f584c66385fe40e1b85cc
          • Opcode Fuzzy Hash: f2bdbcf8902d8d29b3779636cf71fa18ea3bcdcf985454658ec8d31a4a77c111
          • Instruction Fuzzy Hash: DCF068714053849EE7118A1ADC84B66FFA8FF55628F18C45AED484E287C2795844CA71

          Execution Graph

          Execution Coverage:10.7%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:143
          Total number of Limit Nodes:7
          execution_graph 17780 2204668 17781 220467a 17780->17781 17782 2204686 17781->17782 17784 2204778 17781->17784 17785 220479d 17784->17785 17789 2204888 17785->17789 17793 2204879 17785->17793 17791 22048af 17789->17791 17790 220498c 17790->17790 17791->17790 17797 22044c4 17791->17797 17795 22048af 17793->17795 17794 220498c 17794->17794 17795->17794 17796 22044c4 CreateActCtxA 17795->17796 17796->17794 17798 2205918 CreateActCtxA 17797->17798 17800 22059db 17798->17800 17801 220d178 17802 220d1be 17801->17802 17806 220d347 17802->17806 17809 220d358 17802->17809 17803 220d2ab 17812 220b388 17806->17812 17810 220d386 17809->17810 17811 220b388 DuplicateHandle 17809->17811 17810->17803 17811->17810 17813 220d3c0 DuplicateHandle 17812->17813 17814 220d386 17813->17814 17814->17803 17815 220b3b8 17816 220b400 GetModuleHandleW 17815->17816 17817 220b3fa 17815->17817 17818 220b42d 17816->17818 17817->17816 17819 216090c 17820 2160913 17819->17820 17821 216087c 17819->17821 17824 2161718 17820->17824 17840 2161728 17820->17840 17825 2161742 17824->17825 17832 2161766 17825->17832 17856 21620f2 17825->17856 17861 2162229 17825->17861 17865 2161a48 17825->17865 17871 216208a 17825->17871 17876 2161daa 17825->17876 17880 216200c 17825->17880 17887 21621ef 17825->17887 17891 2161d0e 17825->17891 17896 2161e61 17825->17896 17901 2161ce5 17825->17901 17906 21624c6 17825->17906 17910 2161a39 17825->17910 17916 2161bdc 17825->17916 17832->17821 17841 2161742 17840->17841 17842 21620f2 2 API calls 17841->17842 17843 2161bdc 2 API calls 17841->17843 17844 2161766 17841->17844 17845 2161a39 2 API calls 17841->17845 17846 21624c6 2 API calls 17841->17846 17847 2161ce5 2 API calls 17841->17847 17848 2161e61 2 API calls 17841->17848 17849 2161d0e 2 API calls 17841->17849 17850 21621ef 2 API calls 17841->17850 17851 216200c 4 API calls 17841->17851 17852 2161daa 2 API calls 17841->17852 17853 216208a 2 API calls 17841->17853 17854 2161a48 2 API calls 17841->17854 17855 2162229 2 API calls 17841->17855 17842->17844 17843->17844 17844->17821 17845->17844 17846->17844 17847->17844 17848->17844 17849->17844 17850->17844 17851->17844 17852->17844 17853->17844 17854->17844 17855->17844 17857 216210d 17856->17857 17922 21601d0 17857->17922 17926 21601d8 17857->17926 17858 2162407 17930 2160006 17861->17930 17934 2160040 17861->17934 17862 2162243 17867 2161a7b 17865->17867 17866 2161bf8 17866->17832 17867->17866 17938 2160454 17867->17938 17942 2160460 17867->17942 17872 2162030 17871->17872 17874 21601d0 WriteProcessMemory 17872->17874 17875 21601d8 WriteProcessMemory 17872->17875 17873 2162407 17874->17873 17875->17873 17877 2161dd6 17876->17877 17946 21602c0 17876->17946 17950 21602c8 17876->17950 17877->17832 17954 2160111 17880->17954 17958 2160118 17880->17958 17881 216202a 17883 21601d0 WriteProcessMemory 17881->17883 17884 21601d8 WriteProcessMemory 17881->17884 17882 2162407 17883->17882 17884->17882 17889 2160006 Wow64SetThreadContext 17887->17889 17890 2160040 Wow64SetThreadContext 17887->17890 17888 2162209 17889->17888 17890->17888 17892 2161d14 17891->17892 17894 21602c0 ReadProcessMemory 17892->17894 17895 21602c8 ReadProcessMemory 17892->17895 17893 2161dd6 17893->17832 17894->17893 17895->17893 17897 2161d25 17896->17897 17899 21602c0 ReadProcessMemory 17897->17899 17900 21602c8 ReadProcessMemory 17897->17900 17898 2161dd6 17898->17832 17899->17898 17900->17898 17902 2161d08 17901->17902 17904 21601d0 WriteProcessMemory 17902->17904 17905 21601d8 WriteProcessMemory 17902->17905 17903 216262a 17904->17903 17905->17903 17908 21601d0 WriteProcessMemory 17906->17908 17909 21601d8 WriteProcessMemory 17906->17909 17907 21624ea 17908->17907 17909->17907 17912 2161a7b 17910->17912 17911 2161bf8 17911->17832 17912->17911 17914 2160454 CreateProcessA 17912->17914 17915 2160460 CreateProcessA 17912->17915 17913 2161c74 17913->17832 17914->17913 17915->17913 17918 2161b1a 17916->17918 17917 2161bf8 17917->17832 17918->17917 17920 2160454 CreateProcessA 17918->17920 17921 2160460 CreateProcessA 17918->17921 17919 2161c74 17919->17832 17920->17919 17921->17919 17923 21601d8 WriteProcessMemory 17922->17923 17925 2160277 17923->17925 17925->17858 17927 2160220 WriteProcessMemory 17926->17927 17929 2160277 17927->17929 17929->17858 17931 2160040 Wow64SetThreadContext 17930->17931 17933 21600cd 17931->17933 17933->17862 17935 2160085 Wow64SetThreadContext 17934->17935 17937 21600cd 17935->17937 17937->17862 17939 21604e9 CreateProcessA 17938->17939 17941 21606ab 17939->17941 17943 21604e9 CreateProcessA 17942->17943 17945 21606ab 17943->17945 17947 21602c8 ReadProcessMemory 17946->17947 17949 2160357 17947->17949 17949->17877 17951 2160313 ReadProcessMemory 17950->17951 17953 2160357 17951->17953 17953->17877 17955 2160118 VirtualAllocEx 17954->17955 17957 2160195 17955->17957 17957->17881 17959 2160158 VirtualAllocEx 17958->17959 17961 2160195 17959->17961 17961->17881 17962 21628c8 17963 2162a53 17962->17963 17964 21628ee 17962->17964 17964->17963 17967 2162b41 PostMessageW 17964->17967 17969 2162b48 PostMessageW 17964->17969 17968 2162bb4 17967->17968 17968->17964 17970 2162bb4 17969->17970 17970->17964

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 316 2160454-21604f5 318 21604f7-2160501 316->318 319 216052e-216054e 316->319 318->319 320 2160503-2160505 318->320 326 2160587-21605b6 319->326 327 2160550-216055a 319->327 321 2160507-2160511 320->321 322 2160528-216052b 320->322 324 2160515-2160524 321->324 325 2160513 321->325 322->319 324->324 328 2160526 324->328 325->324 335 21605ef-21606a9 CreateProcessA 326->335 336 21605b8-21605c2 326->336 327->326 329 216055c-216055e 327->329 328->322 330 2160560-216056a 329->330 331 2160581-2160584 329->331 333 216056e-216057d 330->333 334 216056c 330->334 331->326 333->333 337 216057f 333->337 334->333 347 21606b2-2160738 335->347 348 21606ab-21606b1 335->348 336->335 338 21605c4-21605c6 336->338 337->331 340 21605c8-21605d2 338->340 341 21605e9-21605ec 338->341 342 21605d6-21605e5 340->342 343 21605d4 340->343 341->335 342->342 345 21605e7 342->345 343->342 345->341 358 216073a-216073e 347->358 359 2160748-216074c 347->359 348->347 358->359 360 2160740 358->360 361 216074e-2160752 359->361 362 216075c-2160760 359->362 360->359 361->362 365 2160754 361->365 363 2160762-2160766 362->363 364 2160770-2160774 362->364 363->364 366 2160768 363->366 367 2160786-216078d 364->367 368 2160776-216077c 364->368 365->362 366->364 369 21607a4 367->369 370 216078f-216079e 367->370 368->367 372 21607a5 369->372 370->369 372->372
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02160696
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 8b27426380db121d6e70ca1d0d9c1c520c2b1cf9449c5a11014f35a661b2addc
          • Instruction ID: e454ec3c1495344ea2f4d9e1898eeef1538892269dbb4a25836785cc5a718408
          • Opcode Fuzzy Hash: 8b27426380db121d6e70ca1d0d9c1c520c2b1cf9449c5a11014f35a661b2addc
          • Instruction Fuzzy Hash: 9D917D71D00219CFDF14CFA8C8447EEBBB2BF48314F0485AAD848A7294DB759995CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 373 2160460-21604f5 375 21604f7-2160501 373->375 376 216052e-216054e 373->376 375->376 377 2160503-2160505 375->377 383 2160587-21605b6 376->383 384 2160550-216055a 376->384 378 2160507-2160511 377->378 379 2160528-216052b 377->379 381 2160515-2160524 378->381 382 2160513 378->382 379->376 381->381 385 2160526 381->385 382->381 392 21605ef-21606a9 CreateProcessA 383->392 393 21605b8-21605c2 383->393 384->383 386 216055c-216055e 384->386 385->379 387 2160560-216056a 386->387 388 2160581-2160584 386->388 390 216056e-216057d 387->390 391 216056c 387->391 388->383 390->390 394 216057f 390->394 391->390 404 21606b2-2160738 392->404 405 21606ab-21606b1 392->405 393->392 395 21605c4-21605c6 393->395 394->388 397 21605c8-21605d2 395->397 398 21605e9-21605ec 395->398 399 21605d6-21605e5 397->399 400 21605d4 397->400 398->392 399->399 402 21605e7 399->402 400->399 402->398 415 216073a-216073e 404->415 416 2160748-216074c 404->416 405->404 415->416 417 2160740 415->417 418 216074e-2160752 416->418 419 216075c-2160760 416->419 417->416 418->419 422 2160754 418->422 420 2160762-2160766 419->420 421 2160770-2160774 419->421 420->421 423 2160768 420->423 424 2160786-216078d 421->424 425 2160776-216077c 421->425 422->419 423->421 426 21607a4 424->426 427 216078f-216079e 424->427 425->424 429 21607a5 426->429 427->426 429->429
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02160696
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 910012e74a4a73872a3b487c3d1e61cf33f632142bcd846d5ff6ed0232f44a12
          • Instruction ID: d4f4577cef8fbe379b81848bc8f6cd05de0c647aba6df2a840556680d5e5a270
          • Opcode Fuzzy Hash: 910012e74a4a73872a3b487c3d1e61cf33f632142bcd846d5ff6ed0232f44a12
          • Instruction Fuzzy Hash: 6A917D71D00219CFDF14CFA8C844BEEBBB2BF48314F0485A9D848A7294DB759995CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 430 220590d-220598c 431 220598f-22059d9 CreateActCtxA 430->431 433 22059e2-2205a3c 431->433 434 22059db-22059e1 431->434 441 2205a4b-2205a4f 433->441 442 2205a3e-2205a41 433->442 434->433 443 2205a60 441->443 444 2205a51-2205a5d 441->444 442->441 446 2205a61 443->446 444->443 446->446
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 022059C9
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 961c194482aa11c19474638df41d491328ff56fc177619304a16c9c95559cd1a
          • Instruction ID: 50ece980206eb8b2a54d60391585cc568f6f7f099c9cc24a3d0d735746ddb976
          • Opcode Fuzzy Hash: 961c194482aa11c19474638df41d491328ff56fc177619304a16c9c95559cd1a
          • Instruction Fuzzy Hash: DE41F4B0C0061DCFDB24CFA9C884ACDBBB5FF48304F60806AD419AB295DB75694ACF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 447 22044c4-22059d9 CreateActCtxA 451 22059e2-2205a3c 447->451 452 22059db-22059e1 447->452 459 2205a4b-2205a4f 451->459 460 2205a3e-2205a41 451->460 452->451 461 2205a60 459->461 462 2205a51-2205a5d 459->462 460->459 464 2205a61 461->464 462->461 464->464
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 022059C9
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: cf918bd147841bebef5f98c5c9e576b20e303535d431d5852105c4215e92ee64
          • Instruction ID: 694d8aed3e2a9fedbcb8860b8ee8318369dcb1c06d2aaa80a500e8d16e95398a
          • Opcode Fuzzy Hash: cf918bd147841bebef5f98c5c9e576b20e303535d431d5852105c4215e92ee64
          • Instruction Fuzzy Hash: 0641F1B0C1071DCBDB24DFAAC884B8EBBF5BF48304F60806AD409AB255DB756949CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 465 2205a84-2205a90 466 2205a42-2205a47 465->466 467 2205a92-2205b14 465->467 470 2205a4b-2205a4f 466->470 471 2205a60 470->471 472 2205a51-2205a5d 470->472 474 2205a61 471->474 472->471 474->474
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 21640be22076543612dd7af5de69cee1e488345e6371f783722d6ad12ffb01a3
          • Instruction ID: f45a61da8566c3b830cb7ad5389d164240cf74d985b3b510251c86e0f8250709
          • Opcode Fuzzy Hash: 21640be22076543612dd7af5de69cee1e488345e6371f783722d6ad12ffb01a3
          • Instruction Fuzzy Hash: 4331BC70804249CFDB11CBE8C8947ADBBF0BF06308F94414AC046AB2AAC779984ACF51

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 475 2160006-216008b 478 216008d-2160099 475->478 479 216009b-21600cb Wow64SetThreadContext 475->479 478->479 481 21600d4-2160104 479->481 482 21600cd-21600d3 479->482 482->481
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 021600BE
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: f6cac0e500551fe0f32df815cd52d697082281fbb532be897e4ba89a4cfe3825
          • Instruction ID: 0fd06f6e2fffca63e80b7cb464981dc0f8507f2392a5bfbc05d02e63f3c74632
          • Opcode Fuzzy Hash: f6cac0e500551fe0f32df815cd52d697082281fbb532be897e4ba89a4cfe3825
          • Instruction Fuzzy Hash: DF31C2718083888FCB01CFB9C8857EEBFF0EF4A314F1884AAD484A7292C7789545CB61

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 486 21601d0-2160226 489 2160236-2160275 WriteProcessMemory 486->489 490 2160228-2160234 486->490 492 2160277-216027d 489->492 493 216027e-21602ae 489->493 490->489 492->493
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02160268
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 17c2772584b98d1fc2b54a32403d7cf8c670547a2b4b69d28ff8895735a6322a
          • Instruction ID: 3bc111d335ea5ad3d47061e0a237eecfead25737f134662b26002c15c5694b53
          • Opcode Fuzzy Hash: 17c2772584b98d1fc2b54a32403d7cf8c670547a2b4b69d28ff8895735a6322a
          • Instruction Fuzzy Hash: B32125B19003599FCF10DFAAC985BEEBBF5FF48310F10842AE919A7250D7789954CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 497 21601d8-2160226 499 2160236-2160275 WriteProcessMemory 497->499 500 2160228-2160234 497->500 502 2160277-216027d 499->502 503 216027e-21602ae 499->503 500->499 502->503
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02160268
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 90767ec3db8859c2aa9afaadfe49305ef124690757391afa44f619faacb522ea
          • Instruction ID: 0a0e879827531682b8bf3193727468507069c83b3e6c771c3ab49a97438f691a
          • Opcode Fuzzy Hash: 90767ec3db8859c2aa9afaadfe49305ef124690757391afa44f619faacb522ea
          • Instruction Fuzzy Hash: 3D2116B59003599FCF10DFAAC985BEEBBF5FF48310F10842AE919A7250D7789954CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 507 220d3b8-220d454 DuplicateHandle 508 220d456-220d45c 507->508 509 220d45d-220d47a 507->509 508->509
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0220D386,?,?,?,?,?), ref: 0220D447
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 87cf471ec23aa2ff18fee4d2393c0421b43b00de202ee1557c0221cf13eaa8a8
          • Instruction ID: 054beb0afd295f3541780fc33cc3e4b0b307015f940cfd2a872319edcd150989
          • Opcode Fuzzy Hash: 87cf471ec23aa2ff18fee4d2393c0421b43b00de202ee1557c0221cf13eaa8a8
          • Instruction Fuzzy Hash: D22103B59012499FDB10CFAAD984AEEFBF4FB48310F10805AE918A7250C378A945CFA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 512 21602c0-2160355 ReadProcessMemory 516 2160357-216035d 512->516 517 216035e-216038e 512->517 516->517
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02160348
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: b403c1f47e78652e0d6f459e57b76249601854c04f54044f77cfbe66cc78f819
          • Instruction ID: 261a9f7a2d10bedcc5a075d4145c16ebce51b04fe0199cf56478aa421054c2d1
          • Opcode Fuzzy Hash: b403c1f47e78652e0d6f459e57b76249601854c04f54044f77cfbe66cc78f819
          • Instruction Fuzzy Hash: 262148B1C003499FCB10DFAAC985AEEBBF5FF48310F54842AE518A7250C7399954CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 521 220b388-220d454 DuplicateHandle 523 220d456-220d45c 521->523 524 220d45d-220d47a 521->524 523->524
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0220D386,?,?,?,?,?), ref: 0220D447
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 1eee83c1548869fff365ed9cc7835b2e4242c6416af0df6343669aa5c4c1028c
          • Instruction ID: bbaea31c1087ae9b65418374fa55c97de05c7b24126ddbd04d17b3c5c8130393
          • Opcode Fuzzy Hash: 1eee83c1548869fff365ed9cc7835b2e4242c6416af0df6343669aa5c4c1028c
          • Instruction Fuzzy Hash: 8E21E5B5901248DFDB10CF9AD584ADEBBF4EB48310F14845AE914A7351D378A940CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 537 21602c8-2160355 ReadProcessMemory 540 2160357-216035d 537->540 541 216035e-216038e 537->541 540->541
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02160348
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: 19a6e2cb2642a43534f4e096a719efc5340252db3b070635813ee840d00dc57b
          • Instruction ID: 3e9433fb6f7d2b697f5ec6fea1da1cb18e583d9e7748a895671ab2e84921a05d
          • Opcode Fuzzy Hash: 19a6e2cb2642a43534f4e096a719efc5340252db3b070635813ee840d00dc57b
          • Instruction Fuzzy Hash: DB2137B1C003499FCB10DFAAC984AEEFBF5FF48320F14842AE519A7250C7799940CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 527 2160040-216008b 529 216008d-2160099 527->529 530 216009b-21600cb Wow64SetThreadContext 527->530 529->530 532 21600d4-2160104 530->532 533 21600cd-21600d3 530->533 533->532
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 021600BE
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 7ec9873ce9820aa4a7833a567f48de79b6644f61f59bc86b4d6e5beaa5788ac4
          • Instruction ID: 11ae9a48d993385f8fa2559d2f2356b15d08776918e7ff9d0c7fd87d00439d36
          • Opcode Fuzzy Hash: 7ec9873ce9820aa4a7833a567f48de79b6644f61f59bc86b4d6e5beaa5788ac4
          • Instruction Fuzzy Hash: D42115B19003099FDB10DFAAC5857AEBBF4FF48364F14842AD519A7240CB78A944CFA0
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0220B41E
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 71ff6a481904635e114f2568ea7adb4bbecb0da2ee90b0e756aaec3985eca1df
          • Instruction ID: 95db53f55abe29314846794825197ead8d7da9d31bddf8d876a89f29cdd87c0f
          • Opcode Fuzzy Hash: 71ff6a481904635e114f2568ea7adb4bbecb0da2ee90b0e756aaec3985eca1df
          • Instruction Fuzzy Hash: 732167B1C043898FDB10CFAAD484ADEBBF4EF48318F14806AC418A7651C338A546CFA0
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02160186
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 4819b3ce09dff8c9b5d2a758e4c00707626504723148db2e098665289a4b6a27
          • Instruction ID: ecc1c2d40e58087c8429d6fe64777cbc160a09a6a8db877455a78dfb608a9ebf
          • Opcode Fuzzy Hash: 4819b3ce09dff8c9b5d2a758e4c00707626504723148db2e098665289a4b6a27
          • Instruction Fuzzy Hash: 931159718002499FCB10DFAAC945AEFBFF5EF48310F108419E519A7250C779A954CBA1
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02160186
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a35c108ec13f7e1567f06bde9ded1ccd6b9b5bfac8bcd94052a19853e87977a7
          • Instruction ID: 3878533b6fde12dd155e1af5746ff4533d449cacd6df0af07c2ec89e84de9e5c
          • Opcode Fuzzy Hash: a35c108ec13f7e1567f06bde9ded1ccd6b9b5bfac8bcd94052a19853e87977a7
          • Instruction Fuzzy Hash: B011F6B59002499FCB10DFAAC945AEFBFF5EF48320F148419E519A7250C779A954CBA0
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0220B41E
          Memory Dump Source
          • Source File: 0000000B.00000002.2141862294.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2200000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 2995377b4a8d19d78dfb2106e84c42f34ffe90e8024ac334c1b49296d6a1476a
          • Instruction ID: 2c1a3e823d31f16fd727f9c3f584953557b6f68c6318d9d85f65b3562a89571d
          • Opcode Fuzzy Hash: 2995377b4a8d19d78dfb2106e84c42f34ffe90e8024ac334c1b49296d6a1476a
          • Instruction Fuzzy Hash: AF110FB5C002498FCB20CF9AD484ADEFBF4EB88218F10845AD428A7254C379A645CFA1
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 02162BA5
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: cc0d44a69bd8b1ce6d11231dba799bee2c1e3880f1380c3290fbfc28846d19d0
          • Instruction ID: b8ff592707dcddc75b74916863aadb35bae25b943948acc8e1e5ac1b96ee4124
          • Opcode Fuzzy Hash: cc0d44a69bd8b1ce6d11231dba799bee2c1e3880f1380c3290fbfc28846d19d0
          • Instruction Fuzzy Hash: A01103B5800249DFCB20DF99C588BEEBFF4FB48314F10845AE918A7610C379A954CFA0
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 02162BA5
          Memory Dump Source
          • Source File: 0000000B.00000002.2141270538.0000000002160000.00000040.00000800.00020000.00000000.sdmp, Offset: 02160000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_2160000_dnshost.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: ccc49927a46b8d18bdad060d65e3e4bed3c2dfd5c90fdbcf09e620293558efe1
          • Instruction ID: e1910b878f5ed08cbe03e1193af3c28e858eab5995f36d0e82bde9dcf4a1dfc0
          • Opcode Fuzzy Hash: ccc49927a46b8d18bdad060d65e3e4bed3c2dfd5c90fdbcf09e620293558efe1
          • Instruction Fuzzy Hash: B111D3B58003499FDB20DF9AC989BDEBBF8EB48314F108459D918A7610C379A944CFA1
          Memory Dump Source
          • Source File: 0000000B.00000002.2135714873.000000000071D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0071D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_71d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 020c7d8b171f6eece8796860811c98039da041c265fa05ddce9f014682fa4204
          • Instruction ID: af4936c8e45f86b3341368d28f1afb29bd805c8d59c93be8dcea1e41a3d92a1d
          • Opcode Fuzzy Hash: 020c7d8b171f6eece8796860811c98039da041c265fa05ddce9f014682fa4204
          • Instruction Fuzzy Hash: 942124B1100244DFDB25DF58D9C0B56BF65FB98314F20C569ED090B296C33EEC86CAA2
          Memory Dump Source
          • Source File: 0000000B.00000002.2137703969.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_20cd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 468c7baa4fbf1d7e0c8310260c56f726b7492c84978f4c7e2a66b19b00eedc11
          • Instruction ID: cac13ce5ca2b4378ba934b14bee2340494eb448ddda688b32a85fb8d465d71c4
          • Opcode Fuzzy Hash: 468c7baa4fbf1d7e0c8310260c56f726b7492c84978f4c7e2a66b19b00eedc11
          • Instruction Fuzzy Hash: 8921D0B1604304DFDB15DF28D984B2ABBA5FB88324F30C57DE94A4B256C33AD407DA62
          Memory Dump Source
          • Source File: 0000000B.00000002.2137703969.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_20cd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0a7ffdf9d558eadc8d9e6d604d6fa201854fd68214cb573b3dd1b2a490cc4304
          • Instruction ID: 048893a6a820e233df3d011e1a63349def39a0609341efe6d94b8e99f7bec4a8
          • Opcode Fuzzy Hash: 0a7ffdf9d558eadc8d9e6d604d6fa201854fd68214cb573b3dd1b2a490cc4304
          • Instruction Fuzzy Hash: 0521F2B1504304EFDB06DF24D9C0B2ABBA5FB98314F30C57DE9494B29AC33AD406EA61
          Memory Dump Source
          • Source File: 0000000B.00000002.2137703969.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_20cd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2562407eb95167bf1890dde899fd602ac1c6721da5c47c5bd7fff5373ccfe046
          • Instruction ID: 902d07b0ec4f89bb39688559c798f95620377e90346fab7276e0b9c70f12ad34
          • Opcode Fuzzy Hash: 2562407eb95167bf1890dde899fd602ac1c6721da5c47c5bd7fff5373ccfe046
          • Instruction Fuzzy Hash: BD2153B55083809FCB13CF14D994715BFB1EB46324F24C5EAD8498B2A7C33A9856DB62
          Memory Dump Source
          • Source File: 0000000B.00000002.2135714873.000000000071D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0071D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_71d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: c35c4e0ca25b79ebcb0e30467210bf8120e6c6f28ff7727836076c9e384b95cb
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: 3C11CD72404280CFCB16CF04D5C4B56BF62FB98324F24C6A9DD090A256C33AE85ACBA2
          Memory Dump Source
          • Source File: 0000000B.00000002.2137703969.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_20cd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction ID: 03dbf4ec295c83d5b8266034171b48d72d9197fc60c9770d3617a8526fc8a240
          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction Fuzzy Hash: 4711BEB5504340DFCB02CF10C5C4B19BBA1FB84214F24C6ADD8494B296C33AD40AEB61
          Memory Dump Source
          • Source File: 0000000B.00000002.2135714873.000000000071D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0071D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_71d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4315108df70cf071b0cfd6f51a5545c1627d8f44bac810cb1c768b083c754676
          • Instruction ID: aa2286b69ee94ad79a54ce773b99acf49640ffab8daa86ffcac86ce5ef8ab64f
          • Opcode Fuzzy Hash: 4315108df70cf071b0cfd6f51a5545c1627d8f44bac810cb1c768b083c754676
          • Instruction Fuzzy Hash: 2F01A7710043449AD7308A2DDD84BA6FF98EF55720F18C86AED191A2C6C37D9C80CE71
          Memory Dump Source
          • Source File: 0000000B.00000002.2135714873.000000000071D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0071D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_11_2_71d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fd01d2d6c6b667340fb79780ec772d4d7703d453999989e73072804a2de091c0
          • Instruction ID: c2a5142756676613886f8c7dd87f72e8ed007c960a22fcaf161622b987555bb9
          • Opcode Fuzzy Hash: fd01d2d6c6b667340fb79780ec772d4d7703d453999989e73072804a2de091c0
          • Instruction Fuzzy Hash: E3F06271404344AEEB208A1ADC84BA2FFA8EF65734F18C45AED585A2C6C3799C44CBB1

          Execution Graph

          Execution Coverage:8.5%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:35
          Total number of Limit Nodes:6
          execution_graph 17237 153dd40 17238 153dd6e 17237->17238 17240 153dd97 17238->17240 17241 153de3f 17238->17241 17243 153d100 17238->17243 17240->17241 17242 153de3a KiUserCallbackDispatcher 17240->17242 17242->17241 17244 153d10b 17243->17244 17247 153d174 17244->17247 17246 153e355 17246->17240 17248 153d17f 17247->17248 17249 153e410 GetFocus 17248->17249 17250 153e409 17248->17250 17249->17250 17250->17246 17251 153d660 DuplicateHandle 17252 153d6f6 17251->17252 17253 153ac90 17254 153ac91 17253->17254 17258 153ad78 17254->17258 17263 153ad88 17254->17263 17255 153ac9f 17260 153ad7c 17258->17260 17259 153adbc 17259->17255 17260->17259 17261 153afc0 GetModuleHandleW 17260->17261 17262 153afed 17261->17262 17262->17255 17265 153ad89 17263->17265 17264 153adbc 17264->17255 17265->17264 17266 153afc0 GetModuleHandleW 17265->17266 17267 153afed 17266->17267 17267->17255 17268 153d418 17269 153d45e GetCurrentProcess 17268->17269 17271 153d4b0 GetCurrentThread 17269->17271 17272 153d4a9 17269->17272 17273 153d4e6 17271->17273 17274 153d4ed GetCurrentProcess 17271->17274 17272->17271 17273->17274 17276 153d523 GetCurrentThreadId 17274->17276 17277 153d57c 17276->17277

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 526 153d418-153d4a7 GetCurrentProcess 530 153d4b0-153d4e4 GetCurrentThread 526->530 531 153d4a9-153d4af 526->531 532 153d4e6-153d4ec 530->532 533 153d4ed-153d521 GetCurrentProcess 530->533 531->530 532->533 535 153d523-153d529 533->535 536 153d52a-153d542 533->536 535->536 538 153d54b-153d57a GetCurrentThreadId 536->538 540 153d583-153d5e5 538->540 541 153d57c-153d582 538->541 541->540
          APIs
          • GetCurrentProcess.KERNEL32 ref: 0153D496
          • GetCurrentThread.KERNEL32 ref: 0153D4D3
          • GetCurrentProcess.KERNEL32 ref: 0153D510
          • GetCurrentThreadId.KERNEL32 ref: 0153D569
          Memory Dump Source
          • Source File: 0000000E.00000002.2191851500.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1530000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 75ca314a7db2ebdccb01c9a7ae031d5a6c8af3b76e79a06094a6cfb4c07c8371
          • Instruction ID: d659b19473762b373aea60815e020d6278f7da40b6c0f0bf12a7d9d5b50ee354
          • Opcode Fuzzy Hash: 75ca314a7db2ebdccb01c9a7ae031d5a6c8af3b76e79a06094a6cfb4c07c8371
          • Instruction Fuzzy Hash: BC5138B09003098FDB14DFAAD548B9EBBF5FF88314F248459E409A7360D778A944CBA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 547 153ad88-153ad97 549 153adc3-153adc7 547->549 550 153ad99-153ada6 call 153a0e4 547->550 551 153addb-153ae1c 549->551 552 153adc9-153add3 549->552 557 153ada8 550->557 558 153adbc 550->558 559 153ae29-153ae37 551->559 560 153ae1e-153ae26 551->560 552->551 605 153adae call 153b010 557->605 606 153adae call 153b020 557->606 558->549 562 153ae5b-153ae5d 559->562 563 153ae39-153ae3e 559->563 560->559 561 153adb4-153adb6 561->558 564 153aef8-153af76 561->564 567 153ae60-153ae67 562->567 565 153ae40-153ae47 call 153a0f0 563->565 566 153ae49 563->566 598 153af78-153af7c 564->598 599 153af7d-153afb8 564->599 570 153ae4b-153ae59 565->570 566->570 568 153ae74-153ae7b 567->568 569 153ae69-153ae71 567->569 574 153ae88-153ae91 call 153a100 568->574 575 153ae7d-153ae85 568->575 569->568 570->567 579 153ae93-153ae9b 574->579 580 153ae9e-153aea3 574->580 575->574 579->580 582 153aec1-153aece 580->582 583 153aea5-153aeac 580->583 588 153aef1-153aef7 582->588 589 153aed0-153aeee 582->589 583->582 584 153aeae-153aebe call 153a110 call 153a120 583->584 584->582 589->588 598->599 600 153afc0-153afeb GetModuleHandleW 599->600 601 153afba-153afbd 599->601 602 153aff4-153b008 600->602 603 153afed-153aff3 600->603 601->600 603->602 605->561 606->561
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0153AFDE
          Memory Dump Source
          • Source File: 0000000E.00000002.2191851500.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1530000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: b7ea937342c39c976f34ea8a59ccc9b1250ec99ccc64ab38cc07772ec4aa010c
          • Instruction ID: 682cbb32381c99462fdc8f0c88bf0a5a18c7e0266db2e21355dd834d22ca3845
          • Opcode Fuzzy Hash: b7ea937342c39c976f34ea8a59ccc9b1250ec99ccc64ab38cc07772ec4aa010c
          • Instruction Fuzzy Hash: 247137B0A00B058FDB25DF2AD44475ABBF5FF88304F008A2DD59ADBA50DB75E845CBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 607 153d660-153d6f4 DuplicateHandle 608 153d6f6-153d6fc 607->608 609 153d6fd-153d71a 607->609 608->609
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0153D6E7
          Memory Dump Source
          • Source File: 0000000E.00000002.2191851500.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1530000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: a45a2085382584eba26e781818d2a4f2acbe441e624f4bd74802a00f103fbf09
          • Instruction ID: 5d18984e622fbc8961f7159f0a699521cd32d8f22e370f63935a2a1af6a984ad
          • Opcode Fuzzy Hash: a45a2085382584eba26e781818d2a4f2acbe441e624f4bd74802a00f103fbf09
          • Instruction Fuzzy Hash: EC21E2B59002089FDB10CFAAD984ADEFFF8FB48310F14841AE918A7310C378A940CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 612 153af78-153afb8 614 153afc0-153afeb GetModuleHandleW 612->614 615 153afba-153afbd 612->615 616 153aff4-153b008 614->616 617 153afed-153aff3 614->617 615->614 617->616
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0153AFDE
          Memory Dump Source
          • Source File: 0000000E.00000002.2191851500.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_1530000_S1qgnlqr1V.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 10e306fd4877c21d605b2b98554ce22c3e993cea7a4dc22682d6a95fef7a73cc
          • Instruction ID: 2d612007cdeb130a182d1253c5e613c69b4486c83bfaac861c315b8bb777bd89
          • Opcode Fuzzy Hash: 10e306fd4877c21d605b2b98554ce22c3e993cea7a4dc22682d6a95fef7a73cc
          • Instruction Fuzzy Hash: 2B11EDB6C006498FDB10DF9AD444ADEFBF8FF88324F10842AD969A7650C379A545CFA1
          Memory Dump Source
          • Source File: 0000000E.00000002.2191448143.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_14ed000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 31e0d571215ffd1039a20c909c0db5dabf55d82639ef9df2db96fad7234954d6
          • Instruction ID: d3680a0b144b97a2c0e684f7ceef700b41d41e9c4068ee96b7ccca5f8aaa1e16
          • Opcode Fuzzy Hash: 31e0d571215ffd1039a20c909c0db5dabf55d82639ef9df2db96fad7234954d6
          • Instruction Fuzzy Hash: FF2125B1904200DFCB15DF68D988B26BFA5FB84319F28C56ED90A0B366C33AD407CA61
          Memory Dump Source
          • Source File: 0000000E.00000002.2191448143.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_14_2_14ed000_S1qgnlqr1V.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 97c8d376d1e593361b5b67634f6e648e200a9afceee1c3aaf62c0cb408ea0c9b
          • Instruction ID: b2d2bd8cd13cabe33f6c2ce66c25eae7e537fb2efe0f5113b2621ce1419c4866
          • Opcode Fuzzy Hash: 97c8d376d1e593361b5b67634f6e648e200a9afceee1c3aaf62c0cb408ea0c9b
          • Instruction Fuzzy Hash: E02183755093808FDB03CF24D594716BFB1EB46214F28C5DBD8498B267C33A980ACB62

          Execution Graph

          Execution Coverage:8.3%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:35
          Total number of Limit Nodes:6
          execution_graph 14376 174ac90 14377 174ac91 14376->14377 14381 174ad78 14377->14381 14386 174ad88 14377->14386 14378 174ac9f 14383 174ad88 14381->14383 14382 174adbc 14382->14378 14383->14382 14384 174afc0 GetModuleHandleW 14383->14384 14385 174afed 14384->14385 14385->14378 14390 174ad89 14386->14390 14387 174adbc 14387->14378 14388 174afc0 GetModuleHandleW 14389 174afed 14388->14389 14389->14378 14390->14387 14390->14388 14401 174d660 DuplicateHandle 14402 174d6f6 14401->14402 14403 174dd40 14404 174dd6e 14403->14404 14406 174dd97 14404->14406 14408 174de3f 14404->14408 14409 174d100 14404->14409 14407 174de3a KiUserCallbackDispatcher 14406->14407 14406->14408 14407->14408 14410 174d10b 14409->14410 14413 174d174 14410->14413 14412 174e355 14412->14406 14414 174d17f 14413->14414 14415 174e410 GetFocus 14414->14415 14416 174e409 14414->14416 14415->14416 14416->14412 14391 174d418 14392 174d45e GetCurrentProcess 14391->14392 14394 174d4b0 GetCurrentThread 14392->14394 14395 174d4a9 14392->14395 14396 174d4e6 14394->14396 14397 174d4ed GetCurrentProcess 14394->14397 14395->14394 14396->14397 14398 174d523 GetCurrentThreadId 14397->14398 14400 174d57c 14398->14400

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 526 174d418-174d4a7 GetCurrentProcess 530 174d4b0-174d4e4 GetCurrentThread 526->530 531 174d4a9-174d4af 526->531 532 174d4e6-174d4ec 530->532 533 174d4ed-174d521 GetCurrentProcess 530->533 531->530 532->533 535 174d523-174d529 533->535 536 174d52a-174d542 533->536 535->536 539 174d54b-174d57a GetCurrentThreadId 536->539 540 174d583-174d5e5 539->540 541 174d57c-174d582 539->541 541->540
          APIs
          • GetCurrentProcess.KERNEL32 ref: 0174D496
          • GetCurrentThread.KERNEL32 ref: 0174D4D3
          • GetCurrentProcess.KERNEL32 ref: 0174D510
          • GetCurrentThreadId.KERNEL32 ref: 0174D569
          Memory Dump Source
          • Source File: 00000010.00000002.2189694579.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_1740000_dnshost.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 73875e7c243b976cbfdf01601d09719c5bf041fc422277ec705f3f7ab70fa6be
          • Instruction ID: 4acfc245a3c3b4eacf33df4885aef5295b3505e7699a144c8e91328646b59e50
          • Opcode Fuzzy Hash: 73875e7c243b976cbfdf01601d09719c5bf041fc422277ec705f3f7ab70fa6be
          • Instruction Fuzzy Hash: 585134B09003098FDB18DFA9D548BAEFBF1FF48314F248059E419A7260D778A984CB65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 547 174ad88-174ad97 549 174adc3-174adc7 547->549 550 174ad99-174ada6 call 174a0e4 547->550 551 174adc9-174add3 549->551 552 174addb-174ae1c 549->552 557 174adbc 550->557 558 174ada8 550->558 551->552 559 174ae1e-174ae26 552->559 560 174ae29-174ae37 552->560 557->549 603 174adae call 174b020 558->603 604 174adae call 174b010 558->604 559->560 561 174ae39-174ae3e 560->561 562 174ae5b-174ae5d 560->562 565 174ae40-174ae47 call 174a0f0 561->565 566 174ae49 561->566 564 174ae60-174ae67 562->564 563 174adb4-174adb6 563->557 567 174aef8-174afb8 563->567 570 174ae74-174ae7b 564->570 571 174ae69-174ae71 564->571 568 174ae4b-174ae59 565->568 566->568 598 174afc0-174afeb GetModuleHandleW 567->598 599 174afba-174afbd 567->599 568->564 572 174ae7d-174ae85 570->572 573 174ae88-174ae91 call 174a100 570->573 571->570 572->573 579 174ae93-174ae9b 573->579 580 174ae9e-174aea3 573->580 579->580 581 174aea5-174aeac 580->581 582 174aec1-174aece 580->582 581->582 584 174aeae-174aebe call 174a110 call 174a120 581->584 588 174aed0-174aeee 582->588 589 174aef1-174aef7 582->589 584->582 588->589 600 174aff4-174b008 598->600 601 174afed-174aff3 598->601 599->598 601->600 603->563 604->563
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0174AFDE
          Memory Dump Source
          • Source File: 00000010.00000002.2189694579.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_1740000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 76d690badc9efbee1fe45c6d9f04307cca6d35171874c16764e6f16db68de3f9
          • Instruction ID: 93ff943a39e97c2be428fe490d2efd645f1eabf534b5a82d43a9e51e0adbc105
          • Opcode Fuzzy Hash: 76d690badc9efbee1fe45c6d9f04307cca6d35171874c16764e6f16db68de3f9
          • Instruction Fuzzy Hash: C5713370A00B058FEB24DF29D44579AFBF5FF88204F008A2DD59AD7A54DB35E845CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 605 174d660-174d6f4 DuplicateHandle 606 174d6f6-174d6fc 605->606 607 174d6fd-174d71a 605->607 606->607
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0174D6E7
          Memory Dump Source
          • Source File: 00000010.00000002.2189694579.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_1740000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 9b12eac142230a0123145068504191f26c2627827f1280fb7b2fce1cc16cedb6
          • Instruction ID: 31b023812da0a5e04e5a05519cac110af80f69e70c2eb42619c29f0de54480d6
          • Opcode Fuzzy Hash: 9b12eac142230a0123145068504191f26c2627827f1280fb7b2fce1cc16cedb6
          • Instruction Fuzzy Hash: 1F21C2B59002499FDB10CFAAD984ADEFFF9FB48310F14841AE958A3350D379A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 610 174af78-174afb8 611 174afc0-174afeb GetModuleHandleW 610->611 612 174afba-174afbd 610->612 613 174aff4-174b008 611->613 614 174afed-174aff3 611->614 612->611 614->613
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 0174AFDE
          Memory Dump Source
          • Source File: 00000010.00000002.2189694579.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_1740000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 0b73438dc0370519e24829583ebf6090d5a864fb24b92ed8650f728c7349a6c4
          • Instruction ID: 1eddf805b55072b15745bae7b2a2c3153a6acdc4519c705de4a820a59156299f
          • Opcode Fuzzy Hash: 0b73438dc0370519e24829583ebf6090d5a864fb24b92ed8650f728c7349a6c4
          • Instruction Fuzzy Hash: E311EDB6C002498FDB10DF9AC444BDEFBF8EF88324F10842AD929A7650C379A545CFA1
          Memory Dump Source
          • Source File: 00000010.00000002.2189383870.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_16cd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ed4172eb0bd1d44311003861b36fb8aaa2097b06295953d082d171461e857bfe
          • Instruction ID: b1e0db551cee0fa90fc934c9f2df076aee33c2a6eef18ba0935b2de4fba9dbd9
          • Opcode Fuzzy Hash: ed4172eb0bd1d44311003861b36fb8aaa2097b06295953d082d171461e857bfe
          • Instruction Fuzzy Hash: 1C21F171504200EFDB06DF98D9C0B26BF65FB98718F60C57DE90A0A256C33AD456CAE2
          Memory Dump Source
          • Source File: 00000010.00000002.2189469320.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_16dd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4596b419fe66ffd22a4f00cb3bbb431c91b240fe8c6acad60604590b5103ff6b
          • Instruction ID: 9c4ccea1598097332be853d1a62a049240601b143819ae51594e090b0380e598
          • Opcode Fuzzy Hash: 4596b419fe66ffd22a4f00cb3bbb431c91b240fe8c6acad60604590b5103ff6b
          • Instruction Fuzzy Hash: 0B210071A04200DFCB15EF68D980B26BF65EBC8314F20C569D90A4B396C33AD407CAA1
          Memory Dump Source
          • Source File: 00000010.00000002.2189469320.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_16dd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be25f8a2123b6a5b1a30553740726ea63a324a9f2af065f1d9a578103d465169
          • Instruction ID: f17bb0fa1e8774c0660c002a6b957d0eafd44e20914559917470e17ce56b9a23
          • Opcode Fuzzy Hash: be25f8a2123b6a5b1a30553740726ea63a324a9f2af065f1d9a578103d465169
          • Instruction Fuzzy Hash: 982192755083809FCB03DF64D994711BF71EB86214F28C5EAD8498F2A7C33A980ACB62
          Memory Dump Source
          • Source File: 00000010.00000002.2189383870.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_16_2_16cd000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: 0f1a4fc4dd0af56cc5932ad5d27c0df053e7346947b7a13cba742fe1b5b61585
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: 6511DF72504240DFDB02CF48D9C4B26BF61FB94324F24C5ADD9090B257C336D45ACBA2

          Execution Graph

          Execution Coverage:10.2%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:213
          Total number of Limit Nodes:7
          execution_graph 30095 6e41b00 30096 6e41b1c 30095->30096 30100 6e42a27 30096->30100 30105 6e42a38 30096->30105 30097 6e41bc6 30101 6e42a38 30100->30101 30110 6e42a68 30101->30110 30115 6e42a78 30101->30115 30102 6e42a5e 30102->30097 30106 6e42a4a 30105->30106 30108 6e42a68 2 API calls 30106->30108 30109 6e42a78 2 API calls 30106->30109 30107 6e42a5e 30107->30097 30108->30107 30109->30107 30111 6e42a78 30110->30111 30120 6e42b48 30111->30120 30125 6e42b39 30111->30125 30112 6e42ab5 30112->30102 30116 6e42a92 30115->30116 30118 6e42b48 2 API calls 30116->30118 30119 6e42b39 2 API calls 30116->30119 30117 6e42ab5 30117->30102 30118->30117 30119->30117 30121 6e42b6c 30120->30121 30130 6e42ca0 30121->30130 30134 6e42ca8 30121->30134 30122 6e42bf3 30122->30112 30126 6e42b6c 30125->30126 30128 6e42ca0 NtQueryInformationProcess 30126->30128 30129 6e42ca8 NtQueryInformationProcess 30126->30129 30127 6e42bf3 30127->30112 30128->30127 30129->30127 30131 6e42ca8 NtQueryInformationProcess 30130->30131 30133 6e42d36 30131->30133 30133->30122 30135 6e42cf3 NtQueryInformationProcess 30134->30135 30136 6e42d36 30135->30136 30136->30122 30011 ed4668 30012 ed467a 30011->30012 30013 ed4686 30012->30013 30015 ed4778 30012->30015 30016 ed4783 30015->30016 30020 ed4888 30016->30020 30024 ed4887 30016->30024 30021 ed48af 30020->30021 30022 ed498c 30021->30022 30028 ed44c4 30021->30028 30026 ed48af 30024->30026 30025 ed498c 30025->30025 30026->30025 30027 ed44c4 CreateActCtxA 30026->30027 30027->30025 30029 ed5918 CreateActCtxA 30028->30029 30031 ed59db 30029->30031 30060 edb3b8 30061 edb3fa 30060->30061 30062 edb400 GetModuleHandleW 30060->30062 30061->30062 30063 edb42d 30062->30063 30064 edd178 30065 edd1be 30064->30065 30069 edd358 30065->30069 30072 edd357 30065->30072 30066 edd2ab 30075 edb388 30069->30075 30073 edd386 30072->30073 30074 edb388 DuplicateHandle 30072->30074 30073->30066 30074->30073 30076 edd3c0 DuplicateHandle 30075->30076 30077 edd386 30076->30077 30077->30066 30032 70f2448 30033 70f246e 30032->30033 30034 70f25d3 30032->30034 30033->30034 30037 70f26c8 PostMessageW 30033->30037 30039 70f26c0 30033->30039 30038 70f2734 30037->30038 30038->30033 30040 70f26c8 PostMessageW 30039->30040 30041 70f2734 30040->30041 30041->30033 30078 6e43778 30080 6e4379c 30078->30080 30083 6e44080 30080->30083 30087 6e44078 30080->30087 30091 6e43384 30080->30091 30084 6e440c6 OutputDebugStringW 30083->30084 30086 6e440ff 30084->30086 30086->30080 30088 6e44080 OutputDebugStringW 30087->30088 30090 6e440ff 30088->30090 30090->30080 30092 6e44130 CloseHandle 30091->30092 30094 6e4419e 30092->30094 30094->30080 30137 70f0773 30138 70f072b 30137->30138 30139 70f077b 30137->30139 30142 70f12a8 30139->30142 30159 70f12a2 30139->30159 30143 70f12c2 30142->30143 30144 70f12e6 30143->30144 30176 70f1d6f 30143->30176 30180 70f15b8 30143->30180 30186 70f1998 30143->30186 30191 70f175c 30143->30191 30197 70f19e1 30143->30197 30202 70f1ca1 30143->30202 30207 70f1865 30143->30207 30212 70f2046 30143->30212 30216 70f15c8 30143->30216 30222 70f1da9 30143->30222 30226 70f192a 30143->30226 30230 70f1b8c 30143->30230 30237 70f188e 30143->30237 30242 70f1dee 30143->30242 30144->30138 30160 70f12a8 30159->30160 30161 70f12e6 30160->30161 30162 70f1d6f 2 API calls 30160->30162 30163 70f1dee 2 API calls 30160->30163 30164 70f188e 2 API calls 30160->30164 30165 70f1b8c 4 API calls 30160->30165 30166 70f192a 2 API calls 30160->30166 30167 70f1da9 2 API calls 30160->30167 30168 70f15c8 2 API calls 30160->30168 30169 70f2046 2 API calls 30160->30169 30170 70f1865 2 API calls 30160->30170 30171 70f1ca1 2 API calls 30160->30171 30172 70f19e1 2 API calls 30160->30172 30173 70f175c 2 API calls 30160->30173 30174 70f1998 2 API calls 30160->30174 30175 70f15b8 2 API calls 30160->30175 30161->30138 30162->30161 30163->30161 30164->30161 30165->30161 30166->30161 30167->30161 30168->30161 30169->30161 30170->30161 30171->30161 30172->30161 30173->30161 30174->30161 30175->30161 30247 6e4fe42 30176->30247 30251 6e4fe48 30176->30251 30177 70f1d89 30182 70f15fb 30180->30182 30181 70f1778 30181->30144 30182->30181 30255 70f02bc 30182->30255 30259 70f02c8 30182->30259 30187 70f19a9 30186->30187 30263 6e4f960 30187->30263 30267 6e4f958 30187->30267 30188 70f201c 30188->30188 30193 70f169a 30191->30193 30192 70f1778 30192->30144 30193->30192 30195 70f02bc CreateProcessA 30193->30195 30196 70f02c8 CreateProcessA 30193->30196 30194 70f17f4 30194->30144 30195->30194 30196->30194 30198 70f18a5 30197->30198 30199 70f1956 30198->30199 30271 70f0128 30198->30271 30275 70f0130 30198->30275 30199->30144 30203 70f1ca7 30202->30203 30205 6e4f960 ResumeThread 30203->30205 30206 6e4f958 ResumeThread 30203->30206 30204 70f201c 30205->30204 30206->30204 30208 70f1888 30207->30208 30279 70f0023 30208->30279 30283 70f0040 30208->30283 30209 70f21aa 30209->30144 30214 70f0023 WriteProcessMemory 30212->30214 30215 70f0040 WriteProcessMemory 30212->30215 30213 70f206a 30214->30213 30215->30213 30218 70f15fb 30216->30218 30217 70f1778 30217->30144 30218->30217 30220 70f02bc CreateProcessA 30218->30220 30221 70f02c8 CreateProcessA 30218->30221 30219 70f17f4 30219->30144 30220->30219 30221->30219 30224 6e4fe42 Wow64SetThreadContext 30222->30224 30225 6e4fe48 Wow64SetThreadContext 30222->30225 30223 70f1dc3 30224->30223 30225->30223 30228 70f0128 ReadProcessMemory 30226->30228 30229 70f0130 ReadProcessMemory 30226->30229 30227 70f1956 30227->30144 30228->30227 30229->30227 30287 6e4ff20 30230->30287 30291 6e4ff18 30230->30291 30231 70f1baa 30235 70f0023 WriteProcessMemory 30231->30235 30236 70f0040 WriteProcessMemory 30231->30236 30232 70f1f87 30235->30232 30236->30232 30238 70f1894 30237->30238 30239 70f1956 30238->30239 30240 70f0128 ReadProcessMemory 30238->30240 30241 70f0130 ReadProcessMemory 30238->30241 30239->30144 30240->30239 30241->30239 30243 70f1df4 30242->30243 30245 6e4f960 ResumeThread 30243->30245 30246 6e4f958 ResumeThread 30243->30246 30244 70f201c 30245->30244 30246->30244 30248 6e4fe48 Wow64SetThreadContext 30247->30248 30250 6e4fed5 30248->30250 30250->30177 30252 6e4fe8d Wow64SetThreadContext 30251->30252 30254 6e4fed5 30252->30254 30254->30177 30256 70f02c8 30255->30256 30256->30256 30257 70f04b6 CreateProcessA 30256->30257 30258 70f0513 30257->30258 30260 70f0351 CreateProcessA 30259->30260 30262 70f0513 30260->30262 30264 6e4f9a0 ResumeThread 30263->30264 30266 6e4f9d1 30264->30266 30266->30188 30268 6e4f960 ResumeThread 30267->30268 30270 6e4f9d1 30268->30270 30270->30188 30272 70f0130 ReadProcessMemory 30271->30272 30274 70f01bf 30272->30274 30274->30199 30276 70f017b ReadProcessMemory 30275->30276 30278 70f01bf 30276->30278 30278->30199 30280 70f0040 WriteProcessMemory 30279->30280 30282 70f00df 30280->30282 30282->30209 30284 70f0088 WriteProcessMemory 30283->30284 30286 70f00df 30284->30286 30286->30209 30288 6e4ff60 VirtualAllocEx 30287->30288 30290 6e4ff9d 30288->30290 30290->30231 30292 6e4ff20 VirtualAllocEx 30291->30292 30294 6e4ff9d 30292->30294 30294->30231 30042 70f4600 30043 70f461e 30042->30043 30044 70f4628 30042->30044 30047 70f4668 30043->30047 30052 70f4653 30043->30052 30048 70f4676 30047->30048 30051 70f4694 30047->30051 30057 70f35c4 30048->30057 30051->30044 30053 70f4676 30052->30053 30056 70f4694 30052->30056 30054 70f35c4 CloseHandle 30053->30054 30055 70f4690 30054->30055 30055->30044 30056->30044 30058 70f4208 CloseHandle 30057->30058 30059 70f426f 30058->30059 30059->30044

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 750 6e42ca0-6e42d34 NtQueryInformationProcess 753 6e42d36-6e42d3c 750->753 754 6e42d3d-6e42d51 750->754 753->754
          APIs
          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 06E42D27
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: InformationProcessQuery
          • String ID:
          • API String ID: 1778838933-0
          • Opcode ID: eec622e914d6e94fd196786dbe21b8e351c2d3be929435aff32a3f8e2504f3c2
          • Instruction ID: 52e31932bd1b1cb78205cb20ffdb450934e559786b0fbe5acbf1da540fd0ad38
          • Opcode Fuzzy Hash: eec622e914d6e94fd196786dbe21b8e351c2d3be929435aff32a3f8e2504f3c2
          • Instruction Fuzzy Hash: 4221BFB59013499FCB10DF9AD885ADEBBF5FF48314F10842AE918A7210D375A944CFA5
          APIs
          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 06E42D27
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: InformationProcessQuery
          • String ID:
          • API String ID: 1778838933-0
          • Opcode ID: e9fb460bcb7f4cafb722176c14facd94981d8838af5da6ae8e97c65a118b22b3
          • Instruction ID: a1ba44d58e44ab846863611fe71d4ccc2c8a5bf18cd68d704e8b4aab73e04d9e
          • Opcode Fuzzy Hash: e9fb460bcb7f4cafb722176c14facd94981d8838af5da6ae8e97c65a118b22b3
          • Instruction Fuzzy Hash: EB21BDB59003499FCB10DF9AD884ADEBBF4FF48310F10842AEA18A7210C379A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 548 70f02bc-70f035d 551 70f035f-70f0369 548->551 552 70f0396-70f03b6 548->552 551->552 553 70f036b-70f036d 551->553 559 70f03ef-70f041e 552->559 560 70f03b8-70f03c2 552->560 554 70f036f-70f0379 553->554 555 70f0390-70f0393 553->555 557 70f037d-70f038c 554->557 558 70f037b 554->558 555->552 557->557 561 70f038e 557->561 558->557 566 70f0457-70f0511 CreateProcessA 559->566 567 70f0420-70f042a 559->567 560->559 562 70f03c4-70f03c6 560->562 561->555 564 70f03e9-70f03ec 562->564 565 70f03c8-70f03d2 562->565 564->559 568 70f03d6-70f03e5 565->568 569 70f03d4 565->569 580 70f051a-70f05a0 566->580 581 70f0513-70f0519 566->581 567->566 571 70f042c-70f042e 567->571 568->568 570 70f03e7 568->570 569->568 570->564 572 70f0451-70f0454 571->572 573 70f0430-70f043a 571->573 572->566 575 70f043e-70f044d 573->575 576 70f043c 573->576 575->575 578 70f044f 575->578 576->575 578->572 591 70f05a2-70f05a6 580->591 592 70f05b0-70f05b4 580->592 581->580 591->592 595 70f05a8 591->595 593 70f05b6-70f05ba 592->593 594 70f05c4-70f05c8 592->594 593->594 596 70f05bc 593->596 597 70f05ca-70f05ce 594->597 598 70f05d8-70f05dc 594->598 595->592 596->594 597->598 599 70f05d0 597->599 600 70f05ee-70f05f5 598->600 601 70f05de-70f05e4 598->601 599->598 602 70f060c 600->602 603 70f05f7-70f0606 600->603 601->600 604 70f060d 602->604 603->602 604->604
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070F04FE
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: a743ffdab3529ce28b7ca62bcf4ad252d1893ea813972c7c3ed4ed5034bd34ef
          • Instruction ID: 6edca21ed2872afe731d15fd47d4fc8189fa0822d7a631caea6202682d8f6f72
          • Opcode Fuzzy Hash: a743ffdab3529ce28b7ca62bcf4ad252d1893ea813972c7c3ed4ed5034bd34ef
          • Instruction Fuzzy Hash: 15A16EB1D0021ACFDB14DF68C941BEEBBF2BF48310F048269D908A7691DBB49985CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 606 70f02c8-70f035d 608 70f035f-70f0369 606->608 609 70f0396-70f03b6 606->609 608->609 610 70f036b-70f036d 608->610 616 70f03ef-70f041e 609->616 617 70f03b8-70f03c2 609->617 611 70f036f-70f0379 610->611 612 70f0390-70f0393 610->612 614 70f037d-70f038c 611->614 615 70f037b 611->615 612->609 614->614 618 70f038e 614->618 615->614 623 70f0457-70f0511 CreateProcessA 616->623 624 70f0420-70f042a 616->624 617->616 619 70f03c4-70f03c6 617->619 618->612 621 70f03e9-70f03ec 619->621 622 70f03c8-70f03d2 619->622 621->616 625 70f03d6-70f03e5 622->625 626 70f03d4 622->626 637 70f051a-70f05a0 623->637 638 70f0513-70f0519 623->638 624->623 628 70f042c-70f042e 624->628 625->625 627 70f03e7 625->627 626->625 627->621 629 70f0451-70f0454 628->629 630 70f0430-70f043a 628->630 629->623 632 70f043e-70f044d 630->632 633 70f043c 630->633 632->632 635 70f044f 632->635 633->632 635->629 648 70f05a2-70f05a6 637->648 649 70f05b0-70f05b4 637->649 638->637 648->649 652 70f05a8 648->652 650 70f05b6-70f05ba 649->650 651 70f05c4-70f05c8 649->651 650->651 653 70f05bc 650->653 654 70f05ca-70f05ce 651->654 655 70f05d8-70f05dc 651->655 652->649 653->651 654->655 656 70f05d0 654->656 657 70f05ee-70f05f5 655->657 658 70f05de-70f05e4 655->658 656->655 659 70f060c 657->659 660 70f05f7-70f0606 657->660 658->657 661 70f060d 659->661 660->659 661->661
          APIs
          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070F04FE
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID:
          • API String ID: 963392458-0
          • Opcode ID: 3c4caf2dd670a5f23a68ffb849e752e6fdef81cc46670b29b091a46621aace72
          • Instruction ID: 86cd693128925f3f642808910f7310318e8cc6f67913e538f6372156ac644a98
          • Opcode Fuzzy Hash: 3c4caf2dd670a5f23a68ffb849e752e6fdef81cc46670b29b091a46621aace72
          • Instruction Fuzzy Hash: 0C916EB1D0021ACFDB14DF68C941BEEBBF2BF48310F048269D918A7295DBB49985CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 663 ed44c4-ed59d9 CreateActCtxA 666 ed59db-ed59e1 663->666 667 ed59e2-ed5a3c 663->667 666->667 674 ed5a3e-ed5a41 667->674 675 ed5a4b-ed5a4f 667->675 674->675 676 ed5a51-ed5a5d 675->676 677 ed5a60 675->677 676->677 679 ed5a61 677->679 679->679
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00ED59C9
          Memory Dump Source
          • Source File: 00000013.00000002.2222646901.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_ed0000_dnshost.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: bc8762aa670158a53ff14f3a7bafcdf7008484ba960ed0e0b6664655b801b417
          • Instruction ID: 8b4139f1e8d4e836eec16445dbba7c553ef58831dfae596dfffeba723fc03e42
          • Opcode Fuzzy Hash: bc8762aa670158a53ff14f3a7bafcdf7008484ba960ed0e0b6664655b801b417
          • Instruction Fuzzy Hash: 1D41EDB1C0061DCFDB24DFA9C884B9EBBB5FF89304F20806AD418AB255DB756946CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 680 70f0023-70f008e 683 70f009e-70f00dd WriteProcessMemory 680->683 684 70f0090-70f009c 680->684 686 70f00df-70f00e5 683->686 687 70f00e6-70f0116 683->687 684->683 686->687
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070F00D0
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: 47bccd4163af8487cf8c2548fcb123300d8f57c55c58141390ae10ff276dde92
          • Instruction ID: 7496735090f13d7aca1edbddd745650e98e97c9099d06fe4137aa0780afa5727
          • Opcode Fuzzy Hash: 47bccd4163af8487cf8c2548fcb123300d8f57c55c58141390ae10ff276dde92
          • Instruction Fuzzy Hash: 1B3168B19003599FCB10CFA9C881BEEBFF5FF48310F14842AE958A7251C7789944CBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 691 70f0040-70f008e 693 70f009e-70f00dd WriteProcessMemory 691->693 694 70f0090-70f009c 691->694 696 70f00df-70f00e5 693->696 697 70f00e6-70f0116 693->697 694->693 696->697
          APIs
          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070F00D0
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessWrite
          • String ID:
          • API String ID: 3559483778-0
          • Opcode ID: aa825db43d45cc25d5b1c55d96e8b1da41ff43c2fe35a08b8f048e8ff4f73cea
          • Instruction ID: aff0d6628acf00edfab54c9f54783632d7cd344e1afde9cef16407301262b5ec
          • Opcode Fuzzy Hash: aa825db43d45cc25d5b1c55d96e8b1da41ff43c2fe35a08b8f048e8ff4f73cea
          • Instruction Fuzzy Hash: EC2139B19003499FCB10DFAAC885BEEBBF5FF48310F108429E919A7251C7799944CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 701 70f0128-70f01bd ReadProcessMemory 705 70f01bf-70f01c5 701->705 706 70f01c6-70f01f6 701->706 705->706
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070F01B0
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: 9c299431c5f1c4ec064aa6579e8bfc136b1077e720ebdf53b9622abc8866eabd
          • Instruction ID: 6a57ed6ec63eed715449ae4e7daa84d504ca4f49bbf69c24991012b2ccbc7ea1
          • Opcode Fuzzy Hash: 9c299431c5f1c4ec064aa6579e8bfc136b1077e720ebdf53b9622abc8866eabd
          • Instruction Fuzzy Hash: 642125B1C003499FDB10DFAAC885AEEBBF5FF48310F10842AE919A7250D7789944CBA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 710 edb388-edd454 DuplicateHandle 712 edd45d-edd47a 710->712 713 edd456-edd45c 710->713 713->712
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00EDD386,?,?,?,?,?), ref: 00EDD447
          Memory Dump Source
          • Source File: 00000013.00000002.2222646901.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_ed0000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: b31b914c6d7028580f6d46cb25269930387aac5fd22e76859639cf97adc9d8a3
          • Instruction ID: de2629d8e984285b205a6925f0ef224fb9ae23712601e8aba116d3d82daa7d77
          • Opcode Fuzzy Hash: b31b914c6d7028580f6d46cb25269930387aac5fd22e76859639cf97adc9d8a3
          • Instruction Fuzzy Hash: 0121E3B59002489FDB10CF9AD984AEEBBF9EB48314F14841AE918B7310D379A950CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 716 6e4fe42-6e4fe93 719 6e4fe95-6e4fea1 716->719 720 6e4fea3-6e4fed3 Wow64SetThreadContext 716->720 719->720 722 6e4fed5-6e4fedb 720->722 723 6e4fedc-6e4ff0c 720->723 722->723
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E4FEC6
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: 97b5cb1e2fc175c2e3f4386f2a036ac103ab463e9c2a3739ac8797eaec1c9767
          • Instruction ID: 9930bf4dba65e67600a97a7e17b217f96c49ff3ad28bad9066cf4388f0f61007
          • Opcode Fuzzy Hash: 97b5cb1e2fc175c2e3f4386f2a036ac103ab463e9c2a3739ac8797eaec1c9767
          • Instruction Fuzzy Hash: BC213AB1D003098FDB50DFAAC8857EEBBF4EF88324F148429D519A7241C778A544CFA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 727 6e4fe48-6e4fe93 729 6e4fe95-6e4fea1 727->729 730 6e4fea3-6e4fed3 Wow64SetThreadContext 727->730 729->730 732 6e4fed5-6e4fedb 730->732 733 6e4fedc-6e4ff0c 730->733 732->733
          APIs
          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E4FEC6
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: ContextThreadWow64
          • String ID:
          • API String ID: 983334009-0
          • Opcode ID: d379d42033272e7d0f81a7652dd9dd2d8f74e1d0c9ca0e3d08ea1f644be8454f
          • Instruction ID: 52e31a06399c25c53a659db6e6581d0d21dbb4017a08113c33eae7538159fbf4
          • Opcode Fuzzy Hash: d379d42033272e7d0f81a7652dd9dd2d8f74e1d0c9ca0e3d08ea1f644be8454f
          • Instruction Fuzzy Hash: B4213BB1D003098FDB50DFAAC5857EEBBF4EF88324F14842AD519A7241CB78A944CFA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 737 70f0130-70f01bd ReadProcessMemory 740 70f01bf-70f01c5 737->740 741 70f01c6-70f01f6 737->741 740->741
          APIs
          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070F01B0
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: MemoryProcessRead
          • String ID:
          • API String ID: 1726664587-0
          • Opcode ID: 583b52ceea2870e67428af1946d187229b3469fd51462926ba803fc7b5fb11e1
          • Instruction ID: f4960717803694f283449bf1f3d679babc20f6354873b61cfa30f6a88084f01b
          • Opcode Fuzzy Hash: 583b52ceea2870e67428af1946d187229b3469fd51462926ba803fc7b5fb11e1
          • Instruction Fuzzy Hash: 682137B1C003499FDB10DFAAC880AEEFBF5FF48310F10842AE519A7250D7389944CBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 745 edd3bf-edd454 DuplicateHandle 746 edd45d-edd47a 745->746 747 edd456-edd45c 745->747 747->746
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00EDD386,?,?,?,?,?), ref: 00EDD447
          Memory Dump Source
          • Source File: 00000013.00000002.2222646901.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_ed0000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 34b600578fcccc08ecb79db19e1ef4951d438e0301927e5b1b92fc2006452c8b
          • Instruction ID: 7e922d6e75d02aaa3888573269635c6023c1c6836855cdc2c4bd238b637e5297
          • Opcode Fuzzy Hash: 34b600578fcccc08ecb79db19e1ef4951d438e0301927e5b1b92fc2006452c8b
          • Instruction Fuzzy Hash: D521C2B59002489FDB10CFAAD984ADEBFF5FB48310F14841AE918A7350D379A945CFA1
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E4FF8E
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 557547ef81a4b18212ff7c87500c05be19220ee89760642fd3496dff314cda99
          • Instruction ID: 7583a2b975e4cc768407d25735f6ca7c3d8e9a42025e182181459dcaf8f6a61b
          • Opcode Fuzzy Hash: 557547ef81a4b18212ff7c87500c05be19220ee89760642fd3496dff314cda99
          • Instruction Fuzzy Hash: 7F1159718002489FCB10DFAAC845BDFBBF5EF88314F248419E519A7250C7759540CBA1
          APIs
          • OutputDebugStringW.KERNELBASE(00000000), ref: 06E440F0
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: DebugOutputString
          • String ID:
          • API String ID: 1166629820-0
          • Opcode ID: ee3496f94a8622877ca4053069ef7e8f87c533f124dedbaea3f802a2e8459313
          • Instruction ID: b3f2801e68e1b45ae3a4dd6f1bb971d9843ea9416eea06d65ecbfda5f63ff114
          • Opcode Fuzzy Hash: ee3496f94a8622877ca4053069ef7e8f87c533f124dedbaea3f802a2e8459313
          • Instruction Fuzzy Hash: 0E1142B1D002599BCB10DF9AD844B9EFBF4FB48320F10811AE818B3240D378A554CFA1
          APIs
          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E4FF8E
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 9cb9d838c48d927c143ca858cf65e658246a2b54871b17c95b5b49548aed1d38
          • Instruction ID: d950d412ab714ece0408ddbd2b56e72334358ad95a3d44207c541e421017f98a
          • Opcode Fuzzy Hash: 9cb9d838c48d927c143ca858cf65e658246a2b54871b17c95b5b49548aed1d38
          • Instruction Fuzzy Hash: 5E1137719002499FCB10DFAAC845AEFBFF5EF88324F248419E519A7250C779A540CFA1
          APIs
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: d55ceaf995ad1f62e027d99bbaa2918bc72aad0553984a0c1a4bfa64fbaee4c1
          • Instruction ID: 162f08afcfea1df0ff6872c4678f31edd2b0e2b5c6b0244085866f25c8747516
          • Opcode Fuzzy Hash: d55ceaf995ad1f62e027d99bbaa2918bc72aad0553984a0c1a4bfa64fbaee4c1
          • Instruction Fuzzy Hash: D81149B19002488BCB20DFAAC8457EFBBF4EB88314F248419D519A7240CB79A540CBA1
          APIs
          • OutputDebugStringW.KERNELBASE(00000000), ref: 06E440F0
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: DebugOutputString
          • String ID:
          • API String ID: 1166629820-0
          • Opcode ID: 5bd4a51da1f6bcf0cbca030c1a5cbc7f4be494251e20ba9e0abd60cfca7be22b
          • Instruction ID: 605be84ea02f9f6946123ee06e24c04431534cb2f7c1e3d865472c72c2cebbde
          • Opcode Fuzzy Hash: 5bd4a51da1f6bcf0cbca030c1a5cbc7f4be494251e20ba9e0abd60cfca7be22b
          • Instruction Fuzzy Hash: 4B1120B1D006599BCB10DFAAD844B9EFBF4FB48320F10812AD918A3240D379A954CFA1
          APIs
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: ResumeThread
          • String ID:
          • API String ID: 947044025-0
          • Opcode ID: 5b15e3c8623cbb615c6bacd3e2779c197476aa931c1756c30052c1b1bdbdd601
          • Instruction ID: c087427e3eaf89d3b39aad40f500203001b7471705311717a50be609190885e3
          • Opcode Fuzzy Hash: 5b15e3c8623cbb615c6bacd3e2779c197476aa931c1756c30052c1b1bdbdd601
          • Instruction Fuzzy Hash: 91113AB1D003488FDB10DFAAC8457AFFBF5EF88724F20841AD519A7250CB79A544CBA1
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 070F2725
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 64c7197aae05119b13904c9b72fb68baa5805c6fc8af3d13fa76f516b110a186
          • Instruction ID: 6c43e2981ad2c4285b26e7fe9d61f7cef965ec7ef57651f0872de423bbf5a7fb
          • Opcode Fuzzy Hash: 64c7197aae05119b13904c9b72fb68baa5805c6fc8af3d13fa76f516b110a186
          • Instruction Fuzzy Hash: 5C11F5B58003499FDB10DF9AD985BDEBBF8FB48310F10841AE558A7600C379A544CFA1
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 00EDB41E
          Memory Dump Source
          • Source File: 00000013.00000002.2222646901.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_ed0000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: fb5c7b065c5bfecaa1a95584da13c46d6177b25a4e82babe4941b43c0d66b25f
          • Instruction ID: 7ec3a9cfb52c18386b0a2058ba7858134f3d89c91d9f5656a24363bf58883e02
          • Opcode Fuzzy Hash: fb5c7b065c5bfecaa1a95584da13c46d6177b25a4e82babe4941b43c0d66b25f
          • Instruction Fuzzy Hash: 9E110FB5C002498FCB10CF9AC444ADEFBF4EB88314F10841AD428B7310D379A545CFA1
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 00EDB41E
          Memory Dump Source
          • Source File: 00000013.00000002.2222646901.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_ed0000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 60f4ac2f75cbc9168af913e829aac02017358e5dcac5fd178a0b0e72954e0a24
          • Instruction ID: b2af94383b968a29b704622dfe564697bab5adbf17b7d14154f9fc90c1ec87de
          • Opcode Fuzzy Hash: 60f4ac2f75cbc9168af913e829aac02017358e5dcac5fd178a0b0e72954e0a24
          • Instruction Fuzzy Hash: 74110FB5C002498FCB10CF9AD444ADEFBF4EB88314F10841AD428B7310D379A546CFA1
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 070F2725
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 5e784e2f0c58d08f10861fee59da80df091f5d1fc84e6b54a77e46463959e881
          • Instruction ID: 2bdd6cdcc119f4420c90f3a90ed8d07be3e7e28ff344081b52b5000ec730db9b
          • Opcode Fuzzy Hash: 5e784e2f0c58d08f10861fee59da80df091f5d1fc84e6b54a77e46463959e881
          • Instruction Fuzzy Hash: 891100B58003499FDB10DF9AC884BDEBBF8FB48320F10841AE558A7600C379A944CFA1
          APIs
          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,070F40B9,?,?), ref: 070F4260
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 8c1595b8f8f238fe811f0795e9a4a5587e7bcdc20fa5e415b2e5d99f25e4c700
          • Instruction ID: 8d8b6cd5fd5c642e527d7f503a2552048660835255b6afaa6347ea184d259082
          • Opcode Fuzzy Hash: 8c1595b8f8f238fe811f0795e9a4a5587e7bcdc20fa5e415b2e5d99f25e4c700
          • Instruction Fuzzy Hash: 981125B58002499FCB20DF9AD845BDEBBF4FB48320F20851AE958A7740D739A584CFA5
          APIs
          • CloseHandle.KERNELBASE(00000000), ref: 06E4418F
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 317e2b7e9a99db1f730c31d2d1399e3a50f82046c53d1f150d43ba67d7509723
          • Instruction ID: a3dae746cc8fc9b44c502d8f215435776f83e288397a8d1249678017f8a3e16b
          • Opcode Fuzzy Hash: 317e2b7e9a99db1f730c31d2d1399e3a50f82046c53d1f150d43ba67d7509723
          • Instruction Fuzzy Hash: E11113B1900349CFDB10DF9AD845BEEBBF8EB58324F108469E518A3750D378A944CBA5
          APIs
          • CloseHandle.KERNELBASE(00000000), ref: 06E4418F
          Memory Dump Source
          • Source File: 00000013.00000002.2239503845.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_6e40000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 59be2d80691f3f5a00df5440da25e010b4c1ec4cc34fde7bc61552290de9ef78
          • Instruction ID: 784bdd940ce576ec25cc980b5376d92a34cd12012d09198cf02031e2fd0e539a
          • Opcode Fuzzy Hash: 59be2d80691f3f5a00df5440da25e010b4c1ec4cc34fde7bc61552290de9ef78
          • Instruction Fuzzy Hash: 1C1113B1900249CFDB10DF9AC885BDEBBF8EB48324F108419E558A3651D378A544CFA5
          APIs
          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,070F40B9,?,?), ref: 070F4260
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: fa9daad06855fc78710dd3d25a2ff72a8a1d64bb13cf8237ca4fa2c996147317
          • Instruction ID: d1a73f6a015ebc93fb2558715644e8402431773955a603d0aa35221a97635431
          • Opcode Fuzzy Hash: fa9daad06855fc78710dd3d25a2ff72a8a1d64bb13cf8237ca4fa2c996147317
          • Instruction Fuzzy Hash: 6F1128B58002498FDB50DF99C545BDEBBF4EB48320F108429EA58A7740D338A544CFA5
          APIs
          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,070F40B9,?,?), ref: 070F4260
          Memory Dump Source
          • Source File: 00000013.00000002.2239903976.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_70f0000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: df46e41a66f869dbe095189a422c848ac80fc605a1bb51d7d11aa3373daa55c1
          • Instruction ID: 53cb8b757107d9aa1576082d9d0a73a7e49ea87ba6fad6dc073baacd7ab07bc1
          • Opcode Fuzzy Hash: df46e41a66f869dbe095189a422c848ac80fc605a1bb51d7d11aa3373daa55c1
          • Instruction Fuzzy Hash: 86113AB5800349DFDB50DF99C445BDEBBF4EB48320F108529EA58A7740D338A544CFA5
          Memory Dump Source
          • Source File: 00000013.00000002.2222150552.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_c5d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fac4ec146312c2c2321f3261699e98b188cee521b6052d1518344c370f03d2c9
          • Instruction ID: f91532b1394f4ef50878b4cbaed7341a21fadc69c01b96ebd67e4b13e5768661
          • Opcode Fuzzy Hash: fac4ec146312c2c2321f3261699e98b188cee521b6052d1518344c370f03d2c9
          • Instruction Fuzzy Hash: DD210679500304DFDB25DF14D9C0B26BF65FB98315F20C569ED0A0B256C33AE89ADAA2
          Memory Dump Source
          • Source File: 00000013.00000002.2222362410.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_e7d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3532ac4f49e445f3ad19b9505c13bfdacf33edcb0ea988ad0971b5c0141a6700
          • Instruction ID: 0702c81d606aadff1135bb592db017d8bb8a075c4d59f5971949c1d1e5191d22
          • Opcode Fuzzy Hash: 3532ac4f49e445f3ad19b9505c13bfdacf33edcb0ea988ad0971b5c0141a6700
          • Instruction Fuzzy Hash: 3A21D3716082449FDB05DF54D980B26BB75FF84318F24C569D94D5B266C33AD806CA61
          Memory Dump Source
          • Source File: 00000013.00000002.2222362410.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_e7d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bf299bc3392374c93725399128bedd34ec3f7abd9939c41e25e81d82fd1635f2
          • Instruction ID: 2d7307171215746a06b869c67dd5ee687af6e4095cb1aad4559a2d67d6f9ba8c
          • Opcode Fuzzy Hash: bf299bc3392374c93725399128bedd34ec3f7abd9939c41e25e81d82fd1635f2
          • Instruction Fuzzy Hash: 1621D075608204DFCB15DF24D984B26BB76EF88318F24D569D90E5B296C33AD807CA61
          Memory Dump Source
          • Source File: 00000013.00000002.2222362410.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_e7d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a91dbc26c27c3ab59455de13ef2fb5314d06a9b139edcb0188f599c62466afc7
          • Instruction ID: eeeffdd5f4d8fa9b8ae7f7a03818ee7fac5cd93e5e80623afa229c35a84d53da
          • Opcode Fuzzy Hash: a91dbc26c27c3ab59455de13ef2fb5314d06a9b139edcb0188f599c62466afc7
          • Instruction Fuzzy Hash: CD21507550D3808FDB12CF24D994715BF72EF46314F28C5EAD8498B6A7C33A980ACB62
          Memory Dump Source
          • Source File: 00000013.00000002.2222150552.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_c5d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: 3bf3c78d6ac168233dc595f537484cee712c3a9bb1d17307159235371fba6097
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: 3C11CD76404340CFDB16CF00D5C4B16BF62FB94324F24C6A9DD4A0A256C33AE99ACBA2
          Memory Dump Source
          • Source File: 00000013.00000002.2222362410.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_e7d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction ID: ef8942525b34bbf5cae4d365d178887e9c02ef3e65a04799aa9497a6263940f3
          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction Fuzzy Hash: 0411BE75508280DFCB02CF50C9C4B15BF71FF84318F24C6A9D8494B266C33AD81ACB61
          Memory Dump Source
          • Source File: 00000013.00000002.2222150552.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_c5d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7c84625264310697be2a1b1896cf1a72ece669c62c1c7ea73c62c097f6eb1af7
          • Instruction ID: ca88458a81a9c7bfa909bdaac194beb791d68a9ea5e9791af876a90df2ceca66
          • Opcode Fuzzy Hash: 7c84625264310697be2a1b1896cf1a72ece669c62c1c7ea73c62c097f6eb1af7
          • Instruction Fuzzy Hash: 9C012035004344DDE7304B16CC84B57FF9CEF59362F18C459ED1A0A25AC3799884C675
          Memory Dump Source
          • Source File: 00000013.00000002.2222150552.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_19_2_c5d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c74740598df9129e4ada467cddd580ed325b2107bb81041035b69b3e960520ba
          • Instruction ID: f9c94322bec69129a129627c4ab28ebe973a9efacb170b498e35342aba82270f
          • Opcode Fuzzy Hash: c74740598df9129e4ada467cddd580ed325b2107bb81041035b69b3e960520ba
          • Instruction Fuzzy Hash: E7F0F675004344DEE7208B16DC84B62FFA8EF55775F18C45AED190B29AC3799C44CAB5

          Execution Graph

          Execution Coverage:9.3%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:127
          Total number of Limit Nodes:13
          execution_graph 29121 5791978 29123 5791979 29121->29123 29122 5791a2a 29123->29122 29126 5792ad9 29123->29126 29130 5792ae0 29123->29130 29127 5792adc DispatchMessageW 29126->29127 29129 5792b4c 29127->29129 29129->29123 29131 5792ae1 DispatchMessageW 29130->29131 29133 5792b4c 29131->29133 29133->29123 29134 16c6e48 29137 16c6a34 29134->29137 29136 16c6e56 29138 16c6a3f 29137->29138 29141 16c6a84 29138->29141 29140 16c6f7d 29140->29136 29142 16c6a8f 29141->29142 29145 16c6ab4 29142->29145 29144 16c705a 29144->29140 29146 16c6abf 29145->29146 29149 16c6ae4 29146->29149 29148 16c714d 29148->29144 29150 16c6aef 29149->29150 29151 16c83b3 29150->29151 29156 16cac58 29150->29156 29152 16c83f1 29151->29152 29160 16ccd50 29151->29160 29165 16ccd40 29151->29165 29152->29148 29170 16cac80 29156->29170 29174 16cac90 29156->29174 29157 16cac6e 29157->29151 29161 16ccd71 29160->29161 29162 16ccd95 29161->29162 29188 16cceef 29161->29188 29192 16ccf00 29161->29192 29162->29152 29166 16ccd71 29165->29166 29167 16ccd95 29166->29167 29168 16cceef 2 API calls 29166->29168 29169 16ccf00 2 API calls 29166->29169 29167->29152 29168->29167 29169->29167 29178 16cad78 29170->29178 29183 16cad88 29170->29183 29171 16cac9f 29171->29157 29175 16cac9f 29174->29175 29176 16cad78 GetModuleHandleW 29174->29176 29177 16cad88 GetModuleHandleW 29174->29177 29175->29157 29176->29175 29177->29175 29179 16cadbc 29178->29179 29180 16cad99 29178->29180 29179->29171 29180->29179 29181 16cafc0 GetModuleHandleW 29180->29181 29182 16cafed 29181->29182 29182->29171 29184 16cad99 29183->29184 29185 16cadbc 29183->29185 29184->29185 29186 16cafc0 GetModuleHandleW 29184->29186 29185->29171 29187 16cafed 29186->29187 29187->29171 29190 16ccf0d 29188->29190 29189 16ccf47 29189->29162 29190->29189 29196 16cb760 29190->29196 29194 16ccf0d 29192->29194 29193 16ccf47 29193->29162 29194->29193 29195 16cb760 2 API calls 29194->29195 29195->29193 29197 16cb76b 29196->29197 29198 16cdc58 29197->29198 29200 16cd064 29197->29200 29201 16cd06f 29200->29201 29202 16c6ae4 2 API calls 29201->29202 29203 16cdcc7 29202->29203 29203->29198 29213 16cd418 29214 16cd45e GetCurrentProcess 29213->29214 29216 16cd4a9 29214->29216 29217 16cd4b0 GetCurrentThread 29214->29217 29216->29217 29218 16cd4ed GetCurrentProcess 29217->29218 29219 16cd4e6 29217->29219 29220 16cd523 29218->29220 29219->29218 29221 16cd54b GetCurrentThreadId 29220->29221 29222 16cd57c 29221->29222 29223 16cfdf8 29224 16cfe1f 29223->29224 29228 57902ab 29224->29228 29233 5790287 29224->29233 29225 16cfe43 29229 57902be 29228->29229 29238 5790560 29229->29238 29242 5790588 29229->29242 29230 57902e1 29230->29225 29234 579028d 29233->29234 29235 57902ac 29233->29235 29234->29225 29236 5790588 PostMessageW 29235->29236 29237 5790560 PostMessageW 29235->29237 29236->29234 29237->29234 29239 5790564 29238->29239 29239->29230 29240 579058d PostMessageW 29239->29240 29241 57905f4 29240->29241 29241->29230 29243 5790589 PostMessageW 29242->29243 29245 57905f4 29243->29245 29245->29230 29246 57913e0 29247 57916e8 29246->29247 29248 5791408 29246->29248 29249 5791411 29248->29249 29253 5791710 29248->29253 29258 5791700 29248->29258 29250 5791434 29255 5791711 29253->29255 29254 579172b 29254->29250 29255->29254 29263 5791758 29255->29263 29267 5791760 29255->29267 29259 579170c 29258->29259 29260 579172b 29259->29260 29261 5791758 OleInitialize 29259->29261 29262 5791760 OleInitialize 29259->29262 29260->29250 29261->29260 29262->29260 29264 579175c OleInitialize 29263->29264 29266 57917c4 29264->29266 29266->29254 29268 5791761 OleInitialize 29267->29268 29270 57917c4 29268->29270 29270->29254 29271 5798b80 29273 5798b88 29271->29273 29272 5798bb8 29273->29272 29275 5798be3 29273->29275 29276 5798bec 29275->29276 29279 5798c25 29276->29279 29280 5796cdc 29276->29280 29279->29272 29281 5798568 CloseHandle 29280->29281 29283 57985cf 29281->29283 29283->29272 29204 16cd660 DuplicateHandle 29205 16cd6f6 29204->29205 29206 16cdd40 29207 16cdd6e 29206->29207 29209 16cdd97 29207->29209 29211 16cde3f 29207->29211 29212 16cd100 GetFocus 29207->29212 29210 16cde3a KiUserCallbackDispatcher 29209->29210 29209->29211 29210->29211 29212->29209

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 704 16cd408-16cd4a7 GetCurrentProcess 708 16cd4a9-16cd4af 704->708 709 16cd4b0-16cd4e4 GetCurrentThread 704->709 708->709 710 16cd4ed-16cd521 GetCurrentProcess 709->710 711 16cd4e6-16cd4ec 709->711 713 16cd52a-16cd545 call 16cd5e7 710->713 714 16cd523-16cd529 710->714 711->710 717 16cd54b-16cd57a GetCurrentThreadId 713->717 714->713 718 16cd57c-16cd582 717->718 719 16cd583-16cd5e5 717->719 718->719
          APIs
          • GetCurrentProcess.KERNEL32 ref: 016CD496
          • GetCurrentThread.KERNEL32 ref: 016CD4D3
          • GetCurrentProcess.KERNEL32 ref: 016CD510
          • GetCurrentThreadId.KERNEL32 ref: 016CD569
          Memory Dump Source
          • Source File: 00000014.00000002.2282399219.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_16c0000_dnshost.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: fb2694cfac44568ac431c772a7a9258833eb91cee6d9fdd59efc86e93d41a713
          • Instruction ID: 93f29459c591b58b2e24e14f4f992a1f65e26b08c7626eea4bcd459b818fd05e
          • Opcode Fuzzy Hash: fb2694cfac44568ac431c772a7a9258833eb91cee6d9fdd59efc86e93d41a713
          • Instruction Fuzzy Hash: AF5126B09006098FDB18DFA9D948BAEBBF5EF48314F24C06DD119A7390D738A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 726 16cd418-16cd4a7 GetCurrentProcess 730 16cd4a9-16cd4af 726->730 731 16cd4b0-16cd4e4 GetCurrentThread 726->731 730->731 732 16cd4ed-16cd521 GetCurrentProcess 731->732 733 16cd4e6-16cd4ec 731->733 735 16cd52a-16cd545 call 16cd5e7 732->735 736 16cd523-16cd529 732->736 733->732 739 16cd54b-16cd57a GetCurrentThreadId 735->739 736->735 740 16cd57c-16cd582 739->740 741 16cd583-16cd5e5 739->741 740->741
          APIs
          • GetCurrentProcess.KERNEL32 ref: 016CD496
          • GetCurrentThread.KERNEL32 ref: 016CD4D3
          • GetCurrentProcess.KERNEL32 ref: 016CD510
          • GetCurrentThreadId.KERNEL32 ref: 016CD569
          Memory Dump Source
          • Source File: 00000014.00000002.2282399219.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_16c0000_dnshost.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: e2a8f5a91661c51828937193f55b918aafcf26a278a032e86aff1fc4b5326a4d
          • Instruction ID: 3b9f8ea3ea397c7c032ef309ecb68bb4baae3c27877b71e7e6987c7fd6d634f9
          • Opcode Fuzzy Hash: e2a8f5a91661c51828937193f55b918aafcf26a278a032e86aff1fc4b5326a4d
          • Instruction Fuzzy Hash: 8D5136B09003098FDB14DFA9D948BAEBBF5EF48314F24C06DD119A7350D738A944CBA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1635 16cad88-16cad97 1636 16cad99-16cada6 call 16ca0e4 1635->1636 1637 16cadc3-16cadc7 1635->1637 1644 16cadbc 1636->1644 1645 16cada8 1636->1645 1638 16cadc9-16cadd3 1637->1638 1639 16caddb-16cae1c 1637->1639 1638->1639 1646 16cae1e-16cae26 1639->1646 1647 16cae29-16cae37 1639->1647 1644->1637 1691 16cadae call 16cb020 1645->1691 1692 16cadae call 16cb010 1645->1692 1646->1647 1649 16cae39-16cae3e 1647->1649 1650 16cae5b-16cae5d 1647->1650 1648 16cadb4-16cadb6 1648->1644 1651 16caef8-16cafb8 1648->1651 1652 16cae49 1649->1652 1653 16cae40-16cae47 call 16ca0f0 1649->1653 1654 16cae60-16cae67 1650->1654 1686 16cafba-16cafbd 1651->1686 1687 16cafc0-16cafeb GetModuleHandleW 1651->1687 1657 16cae4b-16cae59 1652->1657 1653->1657 1655 16cae69-16cae71 1654->1655 1656 16cae74-16cae7b 1654->1656 1655->1656 1661 16cae7d-16cae85 1656->1661 1662 16cae88-16cae91 call 16ca100 1656->1662 1657->1654 1661->1662 1666 16cae9e-16caea3 1662->1666 1667 16cae93-16cae9b 1662->1667 1669 16caea5-16caeac 1666->1669 1670 16caec1-16caece 1666->1670 1667->1666 1669->1670 1671 16caeae-16caebe call 16ca110 call 16ca120 1669->1671 1675 16caed0-16caeee 1670->1675 1676 16caef1-16caef7 1670->1676 1671->1670 1675->1676 1686->1687 1688 16cafed-16caff3 1687->1688 1689 16caff4-16cb008 1687->1689 1688->1689 1691->1648 1692->1648
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 016CAFDE
          Memory Dump Source
          • Source File: 00000014.00000002.2282399219.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_16c0000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 0562d22dee89b8c624b932993a49f6c357708e5bc88063904abf8474c8cc2d46
          • Instruction ID: 56b75942f480a39dc53cc56fd09115b03f80ed6bbb53f9f635b3cb4df698628a
          • Opcode Fuzzy Hash: 0562d22dee89b8c624b932993a49f6c357708e5bc88063904abf8474c8cc2d46
          • Instruction Fuzzy Hash: EB712470A00B098FDB24DF6AD84476ABBF5FF88604F008A2DD58697B50EB74E845CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1693 5790560-5790562 1694 5790569-579056a 1693->1694 1695 5790564-5790568 1693->1695 1696 579056c-579056f 1694->1696 1697 5790571-5790582 1694->1697 1695->1694 1696->1697 1698 5790589-579058c 1697->1698 1699 5790584-5790586 1697->1699 1701 579058d-57905f2 PostMessageW 1698->1701 1700 5790588 1699->1700 1699->1701 1700->1698 1702 57905fb-579061c 1701->1702 1703 57905f4-57905fa 1701->1703 1703->1702
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 057905E5
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: dc231b37e98746546105ed5bce2701e03cd0432e267b9638b66479cbeb249708
          • Instruction ID: 7eb5751b8971dffa9a3fbec91401b1639e2ec2cc8722150a5b21c960b13117c8
          • Opcode Fuzzy Hash: dc231b37e98746546105ed5bce2701e03cd0432e267b9638b66479cbeb249708
          • Instruction Fuzzy Hash: 6A216B75808389CFDB11CF5AD845BDABFF4AF0A310F04409AD584EB252C2389544DBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1705 16cd658-16cd6f4 DuplicateHandle 1706 16cd6fd-16cd71a 1705->1706 1707 16cd6f6-16cd6fc 1705->1707 1707->1706
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016CD6E7
          Memory Dump Source
          • Source File: 00000014.00000002.2282399219.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_16c0000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: dc3aeb89bd1efed970bb365b8e1a800d105c9fd352eadeafda7a73c852423ba2
          • Instruction ID: 151d4ab551401db885d50eb7fcea817ea8569ddf4756b1aec00df598833dfb35
          • Opcode Fuzzy Hash: dc3aeb89bd1efed970bb365b8e1a800d105c9fd352eadeafda7a73c852423ba2
          • Instruction Fuzzy Hash: 3C21E4B59002499FDB10CF9AD985AEEFFF9FB48310F14841AE918A7350C379A944CFA1
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016CD6E7
          Memory Dump Source
          • Source File: 00000014.00000002.2282399219.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_16c0000_dnshost.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 2b5b5e901a09cb63d65be91c342213744fd547583ae18427388fab7fce796b24
          • Instruction ID: 9d18278727defdab5e0e6a7ff505e29198cecf54ff7a1cef6f3fcc8bd4b9d7f7
          • Opcode Fuzzy Hash: 2b5b5e901a09cb63d65be91c342213744fd547583ae18427388fab7fce796b24
          • Instruction Fuzzy Hash: 9021C4B59002599FDB10CF9AD984AEEBFF9FB48310F14841AE918A7350D378A944CFA5
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 057905E5
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 0bb59ca0e77fdec2c4c2d13f7d5a334f1110df1da080057bc97866d0431b0bbe
          • Instruction ID: b52dd8eef114fe3608890ed50100b8ece8258ff630bf3065ed260d75b6fc0d04
          • Opcode Fuzzy Hash: 0bb59ca0e77fdec2c4c2d13f7d5a334f1110df1da080057bc97866d0431b0bbe
          • Instruction Fuzzy Hash: E911F5B5800349DFDB10CF9AC849BEEBBF8EB48320F108419E558A7650D378A584CFA5
          APIs
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: Initialize
          • String ID:
          • API String ID: 2538663250-0
          • Opcode ID: dc457baed5eaa0c4026f8b9b4ecc41b4702beb0fb84284b1e909191d90750aaf
          • Instruction ID: 41e367b19ea97022ff195cc71d438ff2df8b9af76c271425a49c50d704a229fa
          • Opcode Fuzzy Hash: dc457baed5eaa0c4026f8b9b4ecc41b4702beb0fb84284b1e909191d90750aaf
          • Instruction Fuzzy Hash: E11142B480024A8FCB20DF9AD588BDEBBF8EB48364F208419D519A7310D338A544CFA6
          APIs
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: DispatchMessage
          • String ID:
          • API String ID: 2061451462-0
          • Opcode ID: 719f9452a7428d91e0791fd13df12b93f8655b25603548c525affbc3409f7766
          • Instruction ID: 28892b4dbccc667e6ee38726187ad25202ce57b5467b41591b8059f26b772fda
          • Opcode Fuzzy Hash: 719f9452a7428d91e0791fd13df12b93f8655b25603548c525affbc3409f7766
          • Instruction Fuzzy Hash: 5111F2B5C046499FCB24EF9AE844BDEFBF8EB48314F10841AD919A7201D378A545CFA5
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 016CAFDE
          Memory Dump Source
          • Source File: 00000014.00000002.2282399219.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_16c0000_dnshost.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 56349c52f2a7580000ccddf392c92afd30d56c549ffefdaf4c1504c404a48673
          • Instruction ID: 8ef88d3a72a90bc6c501a656073bd9c60a3dc2f5f88051d21d157daeba759000
          • Opcode Fuzzy Hash: 56349c52f2a7580000ccddf392c92afd30d56c549ffefdaf4c1504c404a48673
          • Instruction Fuzzy Hash: 3C1110B5C002498FDB10DF9AC844ADEFBF4EF88714F10841AD928A7640D379A545CFA1
          APIs
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: Initialize
          • String ID:
          • API String ID: 2538663250-0
          • Opcode ID: 3488471a2f33072ac34291cb2215f7e478777026ac4fab67e76189568e2fc6d6
          • Instruction ID: c696f6a0d68a873f53cd60f8cf5fa816080d6fc59ef86c7331dfa79ee88eb967
          • Opcode Fuzzy Hash: 3488471a2f33072ac34291cb2215f7e478777026ac4fab67e76189568e2fc6d6
          • Instruction Fuzzy Hash: D511F0B58003498FDB20DF9AD588BDEFBF8EB48324F20845AD519A7750C379A944CFA5
          APIs
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: DispatchMessage
          • String ID:
          • API String ID: 2061451462-0
          • Opcode ID: 9850a9585e99c11830cff42b8740ea4ec9693d5dc0939d650308ba4466d41610
          • Instruction ID: 1d1197fc86c1dd83ecd92e2acefd0376c66a3a3c7ad48292730bc0f2358ab334
          • Opcode Fuzzy Hash: 9850a9585e99c11830cff42b8740ea4ec9693d5dc0939d650308ba4466d41610
          • Instruction Fuzzy Hash: 6F110DB5C042488FCB10DF9AE848BDEFBF8EB48324F10842AD918A7200D378A544CFA5
          APIs
          • CloseHandle.KERNELBASE(?), ref: 057985C0
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 4fae72800c022e1acdf697a372db82355c8608adf8dca2b9ee328a5a3d68ec3b
          • Instruction ID: ff3f04f063aae25b7211dc7ee721878ff6312b97d3d11ee7f0ba0888fba32b81
          • Opcode Fuzzy Hash: 4fae72800c022e1acdf697a372db82355c8608adf8dca2b9ee328a5a3d68ec3b
          • Instruction Fuzzy Hash: DA217871900348CFCB14DFAAD448B9ABBF4FF49310F208469E958AB251C739E948CFA5
          APIs
          • CloseHandle.KERNELBASE(?), ref: 057985C0
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: d1a8dadb4853b26331c0d551e414e29d4695be8d75240036aaa4a011a221b73c
          • Instruction ID: f86c34afa46b76a3871ea1a99e67204aea3b2027718b47868d5f5db12863901e
          • Opcode Fuzzy Hash: d1a8dadb4853b26331c0d551e414e29d4695be8d75240036aaa4a011a221b73c
          • Instruction Fuzzy Hash: 101125B18007498FCB20DF9AD444BEEBBF4FB48320F108429D959A7340D738A944CFA5
          APIs
          • CloseHandle.KERNELBASE(?), ref: 057985C0
          Memory Dump Source
          • Source File: 00000014.00000002.2287300360.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_5790000_dnshost.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: e6c46eadabbe62adb7f85a195591f3ec512b98cf42a789d44fa515723af38cea
          • Instruction ID: 08f61c4f3c4ea838f62d3346a093f0131cb4f25c41368e4ac1803e163a386cc6
          • Opcode Fuzzy Hash: e6c46eadabbe62adb7f85a195591f3ec512b98cf42a789d44fa515723af38cea
          • Instruction Fuzzy Hash: AE1136B18007498FCB20DF9AD445BEEBBF4FB48320F108429D959A7340D738A944CFA5
          Memory Dump Source
          • Source File: 00000014.00000002.2281106364.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_138d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e847543d907ba3add35f633e3a0d789d8f20b94f1cc58fbb9910dc7c9196f251
          • Instruction ID: 2765af81d4ffc1c0e9e116aed7c2960de51784e1a6b090a6287035060e57c777
          • Opcode Fuzzy Hash: e847543d907ba3add35f633e3a0d789d8f20b94f1cc58fbb9910dc7c9196f251
          • Instruction Fuzzy Hash: 3021F471544304DFDB05EF98D9C0B26BF65FB88318F20C56AD9090B296C33AD415C6B2
          Memory Dump Source
          • Source File: 00000014.00000002.2281188325.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_139d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d46fcc6bd8618ea4c17d99761e870fa3881d37e174ee45518b78864202cfeb9e
          • Instruction ID: a81fb7bf65210b4211987df15047d72ed11f5d7853b5b3ed7caf2ed102ecaf5c
          • Opcode Fuzzy Hash: d46fcc6bd8618ea4c17d99761e870fa3881d37e174ee45518b78864202cfeb9e
          • Instruction Fuzzy Hash: D7212271604204DFDF15DFA8D985B26BF69FB88358F20C56DD90A0B356C33AD807CA61
          Memory Dump Source
          • Source File: 00000014.00000002.2281106364.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_138d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction ID: 22739303c626b3ec6732a3628411d2006f930496705ae70dce0297f421f47f48
          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
          • Instruction Fuzzy Hash: E2119D76504240CFDB16DF58D5C4B16BF72FB84328F24C5AAD9090A256C336D55ACBA2
          Memory Dump Source
          • Source File: 00000014.00000002.2281188325.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_20_2_139d000_dnshost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction ID: c678ebef28e8d3bdbebb5f9d4359464ab95109f847344505840eb45d3b9de74d
          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
          • Instruction Fuzzy Hash: 5111DD75504280CFDB12CF58D5C4B15FFA2FB88318F24C6AAD8494B756C33AD40ACBA2