Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OHScaqAPjt.exe

Overview

General Information

Sample name:OHScaqAPjt.exe
renamed because original name is a hash value
Original sample name:5da381b368562b2c5d9fce29e229c640ea428b3d4519562613f987235bc611b8.exe
Analysis ID:1569266
MD5:17536cc0e75198f811e580990a4f56ef
SHA1:6ce2b12bdc00d37ddbeaed860ec518ca7a4ee9f7
SHA256:5da381b368562b2c5d9fce29e229c640ea428b3d4519562613f987235bc611b8
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • OHScaqAPjt.exe (PID: 3660 cmdline: "C:\Users\user\Desktop\OHScaqAPjt.exe" MD5: 17536CC0E75198F811E580990A4F56EF)
    • powershell.exe (PID: 1396 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7288 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 984 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 2128 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • OHScaqAPjt.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\OHScaqAPjt.exe" MD5: 17536CC0E75198F811E580990A4F56EF)
  • PZgxeUcXE.exe (PID: 7256 cmdline: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe MD5: 17536CC0E75198F811E580990A4F56EF)
    • schtasks.exe (PID: 7468 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PZgxeUcXE.exe (PID: 7512 cmdline: "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe" MD5: 17536CC0E75198F811E580990A4F56EF)
    • PZgxeUcXE.exe (PID: 7520 cmdline: "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe" MD5: 17536CC0E75198F811E580990A4F56EF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "web@iaa-airferight.com", "Password": "webmaster"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.3357331249.00000000032EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000009.00000002.3358108714.0000000002CAC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2172098106.0000000005750000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            0.2.OHScaqAPjt.exe.5750000.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.OHScaqAPjt.exe.5750000.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.OHScaqAPjt.exe.3ca5808.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.OHScaqAPjt.exe.3cba628.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.OHScaqAPjt.exe.3ed6738.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 20 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\OHScaqAPjt.exe", ParentImage: C:\Users\user\Desktop\OHScaqAPjt.exe, ParentProcessId: 3660, ParentProcessName: OHScaqAPjt.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", ProcessId: 1396, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\OHScaqAPjt.exe", ParentImage: C:\Users\user\Desktop\OHScaqAPjt.exe, ParentProcessId: 3660, ParentProcessName: OHScaqAPjt.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", ProcessId: 1396, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe, ParentImage: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe, ParentProcessId: 7256, ParentProcessName: PZgxeUcXE.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp", ProcessId: 7468, ProcessName: schtasks.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\OHScaqAPjt.exe, Initiated: true, ProcessId: 6576, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49710
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\OHScaqAPjt.exe", ParentImage: C:\Users\user\Desktop\OHScaqAPjt.exe, ParentProcessId: 3660, ParentProcessName: OHScaqAPjt.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp", ProcessId: 2128, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\OHScaqAPjt.exe", ParentImage: C:\Users\user\Desktop\OHScaqAPjt.exe, ParentProcessId: 3660, ParentProcessName: OHScaqAPjt.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe", ProcessId: 1396, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\OHScaqAPjt.exe", ParentImage: C:\Users\user\Desktop\OHScaqAPjt.exe, ParentProcessId: 3660, ParentProcessName: OHScaqAPjt.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp", ProcessId: 2128, ProcessName: schtasks.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: OHScaqAPjt.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeAvira: detection malicious, Label: HEUR/AGEN.1305452
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "web@iaa-airferight.com", "Password": "webmaster"}
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeReversingLabs: Detection: 73%
                      Source: OHScaqAPjt.exeReversingLabs: Detection: 73%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeJoe Sandbox ML: detected
                      Source: OHScaqAPjt.exeJoe Sandbox ML: detected
                      Source: OHScaqAPjt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49708 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49711 version: TLS 1.2
                      Source: OHScaqAPjt.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: uIrP.pdb source: OHScaqAPjt.exe, PZgxeUcXE.exe.0.dr
                      Source: Binary string: uIrP.pdbSHA256V. source: OHScaqAPjt.exe, PZgxeUcXE.exe.0.dr

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.5:49710 -> 46.175.148.58:25
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                      Source: PZgxeUcXE.exe, 0000000F.00000002.3366937334.0000000006B66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.00000000032EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                      Source: OHScaqAPjt.exe, 00000000.00000002.2160350490.0000000002CD5000.00000004.00000800.00020000.00000000.sdmp, OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000A.00000002.2237847657.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: OHScaqAPjt.exe, PZgxeUcXE.exe.0.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                      Source: OHScaqAPjt.exe, 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: OHScaqAPjt.exe, 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, OHScaqAPjt.exe, 00000009.00000002.3354438577.0000000000432000.00000040.00000400.00020000.00000000.sdmp, OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49708 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49711 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, abAX9N.cs.Net Code: OPnJT

                      System Summary

                      barindex
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_011DD4A40_2_011DD4A4
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_011DD4D80_2_011DD4D8
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_074374A00_2_074374A0
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_0743A3800_2_0743A380
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_0743EBE80_2_0743EBE8
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_074374920_2_07437492
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_0743A3700_2_0743A370
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_074371600_2_07437160
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_074371700_2_07437170
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_0743EBD80_2_0743EBD8
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E79E780_2_07E79E78
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E71D280_2_07E71D28
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E71D180_2_07E71D18
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E743100_2_07E74310
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E721600_2_07E72160
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E739600_2_07E73960
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E721500_2_07E72150
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E718E00_2_07E718E0
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E718EE0_2_07E718EE
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07E718F00_2_07E718F0
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A7A1989_2_02A7A198
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A7E6B09_2_02A7E6B0
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A74A989_2_02A74A98
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A7A9609_2_02A7A960
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A73E809_2_02A73E80
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A741C89_2_02A741C8
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E55889_2_068E5588
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E65E09_2_068E65E0
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E7D689_2_068E7D68
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068EB20F9_2_068EB20F
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E23589_2_068E2358
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E76889_2_068E7688
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E5CE89_2_068E5CE8
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068EE3889_2_068EE388
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E00409_2_068E0040
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E02E69_2_068E02E6
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_068E00069_2_068E0006
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_0124D4A410_2_0124D4A4
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C68DFB10_2_07C68DFB
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C61D1810_2_07C61D18
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C61D2810_2_07C61D28
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C6431010_2_07C64310
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C6215010_2_07C62150
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C6216010_2_07C62160
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C6396010_2_07C63960
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_07C618F010_2_07C618F0
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_0192E6A115_2_0192E6A1
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_0192A96015_2_0192A960
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_01924A9815_2_01924A98
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_01923E8015_2_01923E80
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_019241C815_2_019241C8
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE65E015_2_06EE65E0
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE558815_2_06EE5588
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE7D6815_2_06EE7D68
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EEB20F15_2_06EEB20F
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE304015_2_06EE3040
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE768815_2_06EE7688
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE5CD315_2_06EE5CD3
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EEE38815_2_06EEE388
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE234915_2_06EE2349
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE004015_2_06EE0040
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EE000615_2_06EE0006
                      Source: OHScaqAPjt.exe, 00000000.00000002.2172612334.0000000007365000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameschtasks.exej% vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000000.00000002.2160350490.0000000002CD5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000000.00000002.2175426498.0000000007CF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000000.00000000.2095138664.00000000008DE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuIrP.exe* vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000000.00000002.2159641487.0000000000F2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exe, 00000009.00000002.3354853711.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exeBinary or memory string: OriginalFilenameuIrP.exe* vs OHScaqAPjt.exe
                      Source: OHScaqAPjt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: OHScaqAPjt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: PZgxeUcXE.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, RsYAkkzVoy.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, Kqqzixk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, xROdzGigX.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, ywes.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, iPVW0zV.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, 1Pi9sgbHwoV.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, qYPY7Ptv9xCkBuL64s.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, qYPY7Ptv9xCkBuL64s.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, qYPY7Ptv9xCkBuL64s.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, mji3xOZ3fGXcEUUn7t.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, mji3xOZ3fGXcEUUn7t.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@2/2
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1436:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3116:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7476:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1352:120:WilError_03
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9FAF.tmpJump to behavior
                      Source: OHScaqAPjt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: OHScaqAPjt.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: OHScaqAPjt.exeReversingLabs: Detection: 73%
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile read: C:\Users\user\Desktop\OHScaqAPjt.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\OHScaqAPjt.exe "C:\Users\user\Desktop\OHScaqAPjt.exe"
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Users\user\Desktop\OHScaqAPjt.exe "C:\Users\user\Desktop\OHScaqAPjt.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Users\user\Desktop\OHScaqAPjt.exe "C:\Users\user\Desktop\OHScaqAPjt.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: rasapi32.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: rasman.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: rtutils.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: secur32.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: schannel.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: OHScaqAPjt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: OHScaqAPjt.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: OHScaqAPjt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: uIrP.pdb source: OHScaqAPjt.exe, PZgxeUcXE.exe.0.dr
                      Source: Binary string: uIrP.pdbSHA256V. source: OHScaqAPjt.exe, PZgxeUcXE.exe.0.dr

                      Data Obfuscation

                      barindex
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, at4ONG9F0NYCELN5Tj.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
                      Source: 0.2.OHScaqAPjt.exe.5750000.3.raw.unpack, at4ONG9F0NYCELN5Tj.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, at4ONG9F0NYCELN5Tj.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, qYPY7Ptv9xCkBuL64s.cs.Net Code: bGY5YeN1FY System.Reflection.Assembly.Load(byte[])
                      Source: OHScaqAPjt.exeStatic PE information: 0xF1F7D0D3 [Fri Aug 22 12:45:07 2098 UTC]
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 0_2_07436772 push esp; ret 0_2_07436779
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeCode function: 9_2_02A70C55 push edi; retf 9_2_02A70C7A
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 10_2_0124F4D0 pushfd ; iretd 10_2_0124F4D1
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_01920C55 push edi; retf 15_2_01920C7A
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeCode function: 15_2_06EEFFB0 push es; ret 15_2_06EEFFC0
                      Source: OHScaqAPjt.exeStatic PE information: section name: .text entropy: 7.656357735824942
                      Source: PZgxeUcXE.exe.0.drStatic PE information: section name: .text entropy: 7.656357735824942
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
                      Source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, at4ONG9F0NYCELN5Tj.csHigh entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
                      Source: 0.2.OHScaqAPjt.exe.5750000.3.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
                      Source: 0.2.OHScaqAPjt.exe.5750000.3.raw.unpack, at4ONG9F0NYCELN5Tj.csHigh entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, kC8ePrINhCFSao7naQM.csHigh entropy of concatenated method names: 'o1wUFdxVjU', 'EjKUXbya7h', 'poFUYrJYjQ', 'HJhUO8DnFm', 'B7cUwj0aK3', 'zgQU6PkuVg', 'mpPU407XI7', 'zS3UTFLhSB', 'hPBUfmTcw9', 'mUwUiCHjwC'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, mji3xOZ3fGXcEUUn7t.csHigh entropy of concatenated method names: 'Sx2dapai4t', 'bSndAqdV15', 'dyidgWvvSq', 'UOjdNFoxxf', 'BFvdLPFFhj', 'XlYdttLhoT', 'FbEd7aKRtA', 'o8RdxvP9px', 'uxldkS4jXs', 'CIldRc8I2f'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, yjUho3IycgDtBBwJjm6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'aUK8aSndBA', 'CCC8AGEpKa', 'vO78gZdQLL', 'PKv8NBxHOG', 'Aut8LQcX2R', 'ley8tbLgj3', 'SuF87WZ1Ap'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, ybwW26mbrr0yRKVBct.csHigh entropy of concatenated method names: 'fatVFfGadm', 'vyCVXQPBBv', 'lrXVYXDlKS', 'JsFVObmAUS', 'YJ7VwdxUPx', 'tdBV6rVFRl', 'q1ZV4ZUwub', 'nEbVTfBZLT', 'cusVfbhuvG', 'EcwViGXpcN'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, mmEGGaQkehAT17s7nk.csHigh entropy of concatenated method names: 'Dispose', 'upYjktVnFZ', 'cBPvmel7xW', 'MArJJ4doC8', 'QfBjRFvJTG', 'dG3jzSAFPK', 'ProcessDialogKey', 'zNGvcmb9jr', 'mvsvjLaAhF', 'IHKvvqabq8'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, Ak5MgMJUNQr7dZoPgp.csHigh entropy of concatenated method names: 'okWDqX1O6t', 'kNhDm0lB2f', 'piQDZ3Mp89', 'daaD3B0c74', 'DCvDa4eVuy', 'jg3D2ypZBO', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, xmtdW29LhhBJobAsjv.csHigh entropy of concatenated method names: 'nQWjVe7RH5', 'PKsjlxYj9m', 'FuGjPYUReT', 'B41j0VGjl2', 'suLjrL4JNc', 'Ft2joFERBM', 'kJUxnV06JpyShAVmCJ', 'W4vb255Ux1nyqZ0gjx', 'XOJjjx0weD', 'YkIjW1gcGg'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, gYPgnEBYIS9vV7Gtl3.csHigh entropy of concatenated method names: 'NZAGBx9hsP', 'QX1GdrIdBS', 'GcxGEfKWdu', 'YeeGVv6wqL', 'DWmGlLr96U', 'co0ELHxg5T', 'KcuEtfC71y', 'M5lE7W9ekn', 'di1ExPwuq2', 'kc7Ekrwj4l'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, XQxM9jshv8UdfB4Vvr.csHigh entropy of concatenated method names: 'DOEVCyb1QN', 'pJGV9IyApQ', 'SypVG7mfpU', 'FvNGROgDhf', 'C6wGz5Bunx', 'cJPVc6OGqZ', 'r4sVj42pAM', 'iKkVvOyc7c', 'PjtVWaJ6hC', 'h6xV57Baev'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, JegwVGPS7M36OZC5N3.csHigh entropy of concatenated method names: 'mn6DCInOVq', 'vEkDdFmGqO', 'l6yD9hJw3j', 'LycDEYt5cM', 'GvgDGPwCqJ', 'yGyDVkPjOr', 'ijSDlCKREa', 'US5DblQHCS', 'qq8DPELqFP', 'vvoD05tjSO'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, QaYi6NEURdpQ6mORE6.csHigh entropy of concatenated method names: 'MoWrSxIHsF', 'anrrMsbTLx', 'YT3raQvNw9', 'H2NrAUhXvZ', 'JwarmcIN8o', 'rKMrZsYTi2', 'kllr3vmeU8', 'BeZr2DGTGl', 'WZ0rI3F0wY', 'qB9rhYtn1s'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, EafZ0xr5G1xsjugm0k.csHigh entropy of concatenated method names: 'ikPQxhfA3s', 'VgmQRFficN', 'kDiDcypuJo', 'wtTDjcBt7n', 'huxQnLCE8w', 'KfqQMmyFCA', 'IBKQHABY0B', 'goBQaSXpI1', 'FQxQAR8IwT', 'ynjQgxGwME'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, IPxjmQ5r4fgreZFDWH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'px1vke0199', 'bXZvRHHOya', 'PLAvzPHtGQ', 'h1VWcZdbBm', 'e6bWjE1qno', 'FVHWvUJ1kF', 'vMxWWMy01F', 'zjiqqmVjgnGAOXkwChY'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, crKrlWjZeSuGsECpQD.csHigh entropy of concatenated method names: 'jQupTFTPEL', 'j0PpfLGRDN', 'FYlpqLG7xe', 'B8mpmQZteF', 'Yrnp3eiudG', 'x5pp2nDZkI', 'Rmdpho4clk', 'gIIps4SGyf', 'IHrpS63a1h', 'K6FpnyuoZS'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, ENk1lg30Ntmgf0jwcF.csHigh entropy of concatenated method names: 'YtCYuKaYh', 'bLuOa98WH', 'Mpf6lFmRP', 'f3D4HkuRL', 'RfQf7Km1p', 'QweinEsjS', 'lcswP4Y0xZoH4M6LAr', 'vU9iXKqZPAdENJtYmX', 'uIr6pcZp1T5fB8l5bg', 'sJeDPLBKe'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, LFuWZASq19NXdi2cKY.csHigh entropy of concatenated method names: 'QmaUjOJ2I6', 'i6MUWVeJbj', 'QUdU5oNPCW', 'EViUCQc0pv', 'XfXUddAX0j', 'FZTUExH40F', 'NGpUG1ZCJC', 'i3wD7mBXdy', 'd4yDxbYDXU', 'w7DDkJxfeQ'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, O46dmpwj1W9ccbiZdu.csHigh entropy of concatenated method names: 'fBO9O3mrST', 'xrn96Qbxap', 'nev9TyxwFH', 'bdC9fdLQFN', 'bFK9r44CKd', 'Psv9oCw8eu', 'j6i9QytpEJ', 'QWc9DUFUr4', 'gmb9Uc0I8x', 'w7B982Ho9D'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, qYPY7Ptv9xCkBuL64s.csHigh entropy of concatenated method names: 'lg9WBbFFQT', 'g1pWCHCs82', 'welWdATYdX', 'G03W9HluPj', 'ApkWEOUsAa', 'l61WG3Mdyh', 'WSIWVjPpgu', 'dfTWlqYgj1', 'P2DWbFYcBh', 'U52WPZ9XGr'
                      Source: 0.2.OHScaqAPjt.exe.7cf0000.4.raw.unpack, r7BbESK4nVruo5mGNK.csHigh entropy of concatenated method names: 'OhJQP9LN1M', 'nosQ0MAqRQ', 'ToString', 'Jw4QC8vXK1', 'OEVQdRn7d9', 'cQKQ9h8LtW', 'aeHQEVqXPy', 'DZpQGeNsJv', 'euAQV67dYV', 'GyQQl9w9cm'
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
                      Source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, at4ONG9F0NYCELN5Tj.csHigh entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 3660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PZgxeUcXE.exe PID: 7256, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 2AB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 9120000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: A120000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: A330000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: B330000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 2C30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: 4C30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 1240000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 4E60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 8F50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 9F50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: A150000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: B150000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 1880000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 3270000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory allocated: 1880000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5774Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5734Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWindow / User API: threadDelayed 2281Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWindow / User API: threadDelayed 7539Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWindow / User API: threadDelayed 2808
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWindow / User API: threadDelayed 7044
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 2992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3652Thread sleep count: 5774 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7192Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3652Thread sleep count: 321 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1516Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1436Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -22136092888451448s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7420Thread sleep count: 2281 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99885s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7420Thread sleep count: 7539 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99766s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep count: 38 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -99063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98953s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98844s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -98110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -97110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -96110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -95110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94989s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -94110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exe TID: 7412Thread sleep time: -93985s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7312Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep count: 38 > 30
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -35048813740048126s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -100000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7652Thread sleep count: 2808 > 30
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99875s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7652Thread sleep count: 7044 > 30
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99765s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99656s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99546s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99437s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99325s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99219s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99109s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -99000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98890s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98759s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98485s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98374s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98265s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98156s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -98047s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97922s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97799s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97671s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97562s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97453s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97343s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97234s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97120s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -97015s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -96906s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -96796s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -96687s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -96574s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -96206s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -95641s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -95531s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -95421s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -95312s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -95203s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -95094s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94984s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94875s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94765s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94656s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94547s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94437s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94328s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94219s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94109s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -94000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -93890s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -93781s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe TID: 7632Thread sleep time: -93617s >= -30000s
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99885Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99531Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99422Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99313Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 99063Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98953Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98844Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98719Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98610Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98485Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98360Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98235Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 98110Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97985Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97860Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97735Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97610Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97485Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97360Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97235Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 97110Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96985Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96860Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96735Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96610Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96485Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96360Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96235Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 96110Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95985Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95860Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95735Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95610Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95485Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95360Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95235Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 95110Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94989Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94860Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94735Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94610Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94485Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94360Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94235Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 94110Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeThread delayed: delay time: 93985Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 100000
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99875
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99765
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99656
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99546
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99437
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99325
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99219
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99109
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 99000
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98890
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98759
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98485
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98374
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98265
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98156
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 98047
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97922
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97799
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97671
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97562
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97453
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97343
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97234
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97120
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 97015
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 96906
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 96796
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 96687
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 96574
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 96206
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 95641
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 95531
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 95421
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 95312
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 95203
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 95094
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94984
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94875
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94765
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94656
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94547
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94437
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94328
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94219
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94109
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 94000
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 93890
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 93781
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeThread delayed: delay time: 93617
                      Source: PZgxeUcXE.exe, 0000000F.00000002.3355815575.00000000013ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllv
                      Source: OHScaqAPjt.exe, 00000009.00000002.3355955658.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe"
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeMemory written: C:\Users\user\Desktop\OHScaqAPjt.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeMemory written: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeProcess created: C:\Users\user\Desktop\OHScaqAPjt.exe "C:\Users\user\Desktop\OHScaqAPjt.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeProcess created: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Users\user\Desktop\OHScaqAPjt.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Users\user\Desktop\OHScaqAPjt.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.3357331249.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.3358108714.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3357331249.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.3358108714.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 3660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PZgxeUcXE.exe PID: 7520, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.5750000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.5750000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2172098106.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\OHScaqAPjt.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Users\user\AppData\Roaming\PZgxeUcXE.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3357331249.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.3358108714.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 3660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PZgxeUcXE.exe PID: 7520, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ed6738.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.3357331249.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.3358108714.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3357331249.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.3358108714.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 3660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OHScaqAPjt.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PZgxeUcXE.exe PID: 7520, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.5750000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.5750000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2172098106.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3cba628.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OHScaqAPjt.exe.3ca5808.2.raw.unpack, type: UNPACKEDPE
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Scheduled Task/Job
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      1
                      Query Registry
                      SMB/Windows Admin Shares1
                      Email Collection
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS211
                      Security Software Discovery
                      Distributed Component Object Model1
                      Input Capture
                      23
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc Filesystem1
                      System Network Configuration Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569266 Sample: OHScaqAPjt.exe Startdate: 05/12/2024 Architecture: WINDOWS Score: 100 48 mail.iaa-airferight.com 2->48 50 api.ipify.org 2->50 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus / Scanner detection for submitted sample 2->60 62 13 other signatures 2->62 8 OHScaqAPjt.exe 7 2->8         started        12 PZgxeUcXE.exe 5 2->12         started        signatures3 process4 file5 40 C:\Users\user\AppData\Roaming\PZgxeUcXE.exe, PE32 8->40 dropped 42 C:\Users\...\PZgxeUcXE.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp9FAF.tmp, XML 8->44 dropped 46 C:\Users\user\AppData\...\OHScaqAPjt.exe.log, ASCII 8->46 dropped 64 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->64 66 Uses schtasks.exe or at.exe to add and modify task schedules 8->66 68 Adds a directory exclusion to Windows Defender 8->68 70 Injects a PE file into a foreign processes 8->70 14 OHScaqAPjt.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        72 Antivirus detection for dropped file 12->72 74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 24 PZgxeUcXE.exe 12->24         started        26 schtasks.exe 12->26         started        28 PZgxeUcXE.exe 12->28         started        signatures6 process7 dnsIp8 52 api.ipify.org 172.67.74.152, 443, 49708, 49711 CLOUDFLARENETUS United States 14->52 54 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->54 78 Loading BitLocker PowerShell Module 18->78 30 conhost.exe 18->30         started        32 WmiPrvSE.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        80 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->80 82 Tries to steal Mail credentials (via file / registry access) 24->82 84 Tries to harvest and steal ftp login credentials 24->84 86 Tries to harvest and steal browser information (history, passwords, etc) 24->86 38 conhost.exe 26->38         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      OHScaqAPjt.exe74%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      OHScaqAPjt.exe100%AviraHEUR/AGEN.1305452
                      OHScaqAPjt.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\PZgxeUcXE.exe100%AviraHEUR/AGEN.1305452
                      C:\Users\user\AppData\Roaming\PZgxeUcXE.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\PZgxeUcXE.exe74%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://crl.micro0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.iaa-airferight.com
                      46.175.148.58
                      truefalse
                        high
                        api.ipify.org
                        172.67.74.152
                        truefalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.ipify.orgOHScaqAPjt.exe, 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, OHScaqAPjt.exe, 00000009.00000002.3354438577.0000000000432000.00000040.00000400.00020000.00000000.sdmp, OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://account.dyn.com/OHScaqAPjt.exe, 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://crl.microPZgxeUcXE.exe, 0000000F.00000002.3366937334.0000000006B66000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.ipify.org/tOHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOHScaqAPjt.exe, 00000000.00000002.2160350490.0000000002CD5000.00000004.00000800.00020000.00000000.sdmp, OHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000A.00000002.2237847657.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://mail.iaa-airferight.comOHScaqAPjt.exe, 00000009.00000002.3358108714.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, PZgxeUcXE.exe, 0000000F.00000002.3357331249.00000000032EC000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/DataSet1.xsdOHScaqAPjt.exe, PZgxeUcXE.exe.0.drfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        46.175.148.58
                                        mail.iaa-airferight.comUkraine
                                        56394ASLAGIDKOM-NETUAfalse
                                        172.67.74.152
                                        api.ipify.orgUnited States
                                        13335CLOUDFLARENETUSfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1569266
                                        Start date and time:2024-12-05 17:01:57 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 7m 44s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:18
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:OHScaqAPjt.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:5da381b368562b2c5d9fce29e229c640ea428b3d4519562613f987235bc611b8.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@21/15@2/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 171
                                        • Number of non-executed functions: 25
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: OHScaqAPjt.exe
                                        TimeTypeDescription
                                        11:03:01API Interceptor177x Sleep call for process: OHScaqAPjt.exe modified
                                        11:03:03API Interceptor31x Sleep call for process: powershell.exe modified
                                        11:03:09API Interceptor171x Sleep call for process: PZgxeUcXE.exe modified
                                        17:03:04Task SchedulerRun new task: PZgxeUcXE path: C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        46.175.148.58RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                          v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                            l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                              SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                  McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                    55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      tEEa6j67ss.exeGet hashmaliciousAgentTeslaBrowse
                                                        RXvVlckUyt.exeGet hashmaliciousAgentTeslaBrowse
                                                          LEVER STYLE SEP BUY ORDER & C248SH12.exeGet hashmaliciousAgentTeslaBrowse
                                                            172.67.74.1522b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                            • api.ipify.org/
                                                            Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                            • api.ipify.org/
                                                            67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                            • api.ipify.org/
                                                            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                            • api.ipify.org/
                                                            4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                                            • api.ipify.org/
                                                            y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                                            • api.ipify.org/
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • api.ipify.org/
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • api.ipify.org/
                                                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                            • api.ipify.org/
                                                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                                                            • api.ipify.org/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            mail.iaa-airferight.comRFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 46.175.148.58
                                                            2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 46.175.148.58
                                                            55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 46.175.148.58
                                                            tEEa6j67ss.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            RXvVlckUyt.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            LEVER STYLE SEP BUY ORDER & C248SH12.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            api.ipify.org8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.12.205
                                                            xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 104.26.12.205
                                                            https://app.peony.ink/view/902b02a8-11f0-4e28-89b1-5318035c10ebGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                            • 104.26.12.205
                                                            7Gt3icFvQW.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.12.205
                                                            1AxSwjpyGp.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 104.26.12.205
                                                            FPBKcOFjEP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 104.26.12.205
                                                            MerchantDetailedStatement_37063_04122024.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            https://click.pstmrk.it/3s/bmxn8t84vg.gherapilta.shop%2F/ySDk/28y5AQ/AQ/e82f1f59-f734-42be-affb-895d81855fb4/1/pD2JDTOBnbGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                            • 104.26.12.205
                                                            RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 104.26.12.205
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            ASLAGIDKOM-NETUARFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 46.175.148.58
                                                            2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 46.175.148.58
                                                            55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 46.175.148.58
                                                            tEEa6j67ss.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            RXvVlckUyt.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            LEVER STYLE SEP BUY ORDER & C248SH12.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 46.175.148.58
                                                            CLOUDFLARENETUS3D7sM44MQp.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.12.205
                                                            http://kitces.emlnk1.comGet hashmaliciousUnknownBrowse
                                                            • 104.20.0.15
                                                            https://vacilandoblog.wordpress.com/2015/04/22/a-tribute-to-my-mother-in-law-rest-in-peace-april-22-2015/Get hashmaliciousUnknownBrowse
                                                            • 172.64.150.63
                                                            DX7V71Ro7b.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 104.26.12.205
                                                            https://sendgb.com/Aw8gObHpGVR?utm_medium=dZJEAfc2MGnvjBDGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.21.80.92
                                                            MOV-0903787857-(Jmulvey)MMS0%3A28.mp4.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            https://sendgb.com/dxukcl49bIj?utm_medium=mvC3BJ1YMhqe8znGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.21.80.92
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0e8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            DX7V71Ro7b.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • 172.67.74.152
                                                            xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 172.67.74.152
                                                            9KpgpwwGDy.imgGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 172.67.74.152
                                                            z43INF_20231205_A1B5C3.msiGet hashmaliciousUnknownBrowse
                                                            • 172.67.74.152
                                                            9V4TlKwcz3.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 172.67.74.152
                                                            uC70JKtV2B.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 172.67.74.152
                                                            cxYwMzCUCd.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 172.67.74.152
                                                            t4U6b6M0ZH.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            • 172.67.74.152
                                                            No context
                                                            Process:C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:true
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2232
                                                            Entropy (8bit):5.380747059108785
                                                            Encrypted:false
                                                            SSDEEP:48:lylWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//8PUyus:lGLHxvIIwLgZ2KRHWLOug8s
                                                            MD5:CAAF9E85F4215DFF27856092092AD361
                                                            SHA1:F9CDD4D9D1C22BAE6BAAC86BFD85A82AA22D9CA9
                                                            SHA-256:85B3FC09907CF6D617498E0051E9B0C07FB195ADB8478F46082ED71FB8722C04
                                                            SHA-512:DFCA3A002C5C7522DF748DA2632E531AC24D669DFDEE96FF7E9E39B755415672AC608FB80C1CCC9EC059D1EC0E0B43D85BC7DE2FD8218D7CB2CEE26D0C287427
                                                            Malicious:false
                                                            Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1582
                                                            Entropy (8bit):5.106382961105342
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtz5xvn:cgergYrFdOFzOzN33ODOiDdKrsuTzvv
                                                            MD5:3A7727BA273444DA1206937EC0710E52
                                                            SHA1:FC591B3469B5B9C5A9B77642054BF5845D437A78
                                                            SHA-256:6B77A4DD15F7344B3928AA861756EC50ADF888FC943F920E89C95CD59453B288
                                                            SHA-512:43B4BE6F845BA5EFC3BECDE6740DDB831521217F5C4D6CAE8E16EA529DF458AA3EA181FDFF934249EDA37038B6CD7E8F6A961B4A64882EA82445DE39A2C14D23
                                                            Malicious:true
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                            Process:C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1582
                                                            Entropy (8bit):5.106382961105342
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtz5xvn:cgergYrFdOFzOzN33ODOiDdKrsuTzvv
                                                            MD5:3A7727BA273444DA1206937EC0710E52
                                                            SHA1:FC591B3469B5B9C5A9B77642054BF5845D437A78
                                                            SHA-256:6B77A4DD15F7344B3928AA861756EC50ADF888FC943F920E89C95CD59453B288
                                                            SHA-512:43B4BE6F845BA5EFC3BECDE6740DDB831521217F5C4D6CAE8E16EA529DF458AA3EA181FDFF934249EDA37038B6CD7E8F6A961B4A64882EA82445DE39A2C14D23
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                            Process:C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):943104
                                                            Entropy (8bit):7.4091439927512255
                                                            Encrypted:false
                                                            SSDEEP:12288:SHuE6IGxLuyNNf73TysKZndG0zygEQ9z51V63ObdUq77OASBZmKv6ywfIF:z5TysKZdjTFz51VuObOu7OA+fvVFF
                                                            MD5:17536CC0E75198F811E580990A4F56EF
                                                            SHA1:6CE2B12BDC00D37DDBEAED860EC518CA7A4EE9F7
                                                            SHA-256:5DA381B368562B2C5D9FCE29E229C640EA428B3D4519562613F987235BC611B8
                                                            SHA-512:643A023EB3B48E5D2DACF140F157794B25A1558E4401C467A264885AFD3C6F3F02B06DB45BEF8B202F3E723841FAAB0A651517C42D445F4F18E033919E1BAD89
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................................@.....................................O.......0...........................@...p............................................ ............... ..H............text....... ...................... ..`.rsrc...0...........................@..@.reloc...............b..............@..B........................H.......................U...4...........................................0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*Z..}......}.....(.....*....0............{.....+..*&...}....*...0............{.....+..*&...}....*j.s....}......}.....(.....*....0............{.....+..*&...}....*...0............{.....+..*&...}....*".(.....*..0............{.....+..*&...}....*...0............{.....+..*
                                                            Process:C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.4091439927512255
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:OHScaqAPjt.exe
                                                            File size:943'104 bytes
                                                            MD5:17536cc0e75198f811e580990a4f56ef
                                                            SHA1:6ce2b12bdc00d37ddbeaed860ec518ca7a4ee9f7
                                                            SHA256:5da381b368562b2c5d9fce29e229c640ea428b3d4519562613f987235bc611b8
                                                            SHA512:643a023eb3b48e5d2dacf140f157794b25a1558e4401c467a264885afd3c6f3f02b06db45bef8b202f3e723841faab0a651517c42d445f4f18e033919e1bad89
                                                            SSDEEP:12288:SHuE6IGxLuyNNf73TysKZndG0zygEQ9z51V63ObdUq77OASBZmKv6ywfIF:z5TysKZdjTFz51VuObOu7OA+fvVFF
                                                            TLSH:61151403692C89B2EE75633D002089F492F41D9C5599F2164BF8BDBEF83D6215D1FA2E
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................................@................................
                                                            Icon Hash:2946e68e96b3ca4d
                                                            Entrypoint:0x4bc6d6
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0xF1F7D0D3 [Fri Aug 22 12:45:07 2098 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbc6810x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x2b730.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb8a400x70.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xba6dc0xba800c5702b63c143a6872e06a54711eaa3bcFalse0.8734618486092494data7.656357735824942IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xbe0000x2b7300x2b800a2d3cdc0adf9702f5aac04bcb22ab819False0.2097027658045977data5.1321517758216055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xea0000xc0x20014ce96999f7954b7bc8e57907882aae3False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xbe2b00x3751PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9929383518113127
                                                            RT_ICON0xc1a040x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.0891251626641429
                                                            RT_ICON0xd222c0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.13335610678999368
                                                            RT_ICON0xdb6d40x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.16816081330868762
                                                            RT_ICON0xe0b5c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.15594000944733113
                                                            RT_ICON0xe4d840x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23392116182572614
                                                            RT_ICON0xe732c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.274624765478424
                                                            RT_ICON0xe83d40x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.41885245901639345
                                                            RT_ICON0xe8d5c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5
                                                            RT_GROUP_ICON0xe91c40x84data0.7045454545454546
                                                            RT_VERSION0xe92480x2fcdata0.43455497382198954
                                                            RT_MANIFEST0xe95440x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 5, 2024 17:03:04.696907997 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:04.696960926 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:04.697088957 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:04.725742102 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:04.725756884 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:05.944746971 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:05.944848061 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:05.948523045 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:05.948542118 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:05.948843956 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:06.052901983 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:06.099339962 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:06.404412985 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:06.404486895 CET44349708172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:06.404759884 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:06.410366058 CET49708443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:07.328659058 CET4971025192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:08.355142117 CET4971025192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:10.370773077 CET4971025192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:11.810353041 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:11.810401917 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:11.810491085 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:11.814030886 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:11.814049006 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.026391029 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.026480913 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:13.028181076 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:13.028192043 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.028431892 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.073899031 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:13.122505903 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:13.167329073 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.474339008 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.474406958 CET44349711172.67.74.152192.168.2.5
                                                            Dec 5, 2024 17:03:13.474670887 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:13.477233887 CET49711443192.168.2.5172.67.74.152
                                                            Dec 5, 2024 17:03:13.950073004 CET4971325192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:14.370773077 CET4971025192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:14.964618921 CET4971325192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:16.964529037 CET4971325192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:20.964535952 CET4971325192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:22.370784998 CET4971025192.168.2.546.175.148.58
                                                            Dec 5, 2024 17:03:28.966506958 CET4971325192.168.2.546.175.148.58
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 5, 2024 17:03:04.548903942 CET6077353192.168.2.51.1.1.1
                                                            Dec 5, 2024 17:03:04.687731028 CET53607731.1.1.1192.168.2.5
                                                            Dec 5, 2024 17:03:07.022447109 CET5898353192.168.2.51.1.1.1
                                                            Dec 5, 2024 17:03:07.327903986 CET53589831.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Dec 5, 2024 17:03:04.548903942 CET192.168.2.51.1.1.10xbb8bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                            Dec 5, 2024 17:03:07.022447109 CET192.168.2.51.1.1.10x798Standard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Dec 5, 2024 17:03:04.687731028 CET1.1.1.1192.168.2.50xbb8bNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                            Dec 5, 2024 17:03:04.687731028 CET1.1.1.1192.168.2.50xbb8bNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                            Dec 5, 2024 17:03:04.687731028 CET1.1.1.1192.168.2.50xbb8bNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                            Dec 5, 2024 17:03:07.327903986 CET1.1.1.1192.168.2.50x798No error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false
                                                            • api.ipify.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549708172.67.74.1524436576C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-12-05 16:03:06 UTC155OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                            Host: api.ipify.org
                                                            Connection: Keep-Alive
                                                            2024-12-05 16:03:06 UTC424INHTTP/1.1 200 OK
                                                            Date: Thu, 05 Dec 2024 16:03:06 GMT
                                                            Content-Type: text/plain
                                                            Content-Length: 12
                                                            Connection: close
                                                            Vary: Origin
                                                            CF-Cache-Status: DYNAMIC
                                                            Server: cloudflare
                                                            CF-RAY: 8ed543abde8f5e7c-EWR
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1838&min_rtt=1773&rtt_var=795&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1272885&cwnd=190&unsent_bytes=0&cid=96c911f8b9103689&ts=473&x=0"
                                                            2024-12-05 16:03:06 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                            Data Ascii: 8.46.123.228


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549711172.67.74.1524437520C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-12-05 16:03:13 UTC155OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                            Host: api.ipify.org
                                                            Connection: Keep-Alive
                                                            2024-12-05 16:03:13 UTC424INHTTP/1.1 200 OK
                                                            Date: Thu, 05 Dec 2024 16:03:13 GMT
                                                            Content-Type: text/plain
                                                            Content-Length: 12
                                                            Connection: close
                                                            Vary: Origin
                                                            CF-Cache-Status: DYNAMIC
                                                            Server: cloudflare
                                                            CF-RAY: 8ed543d82e4f423b-EWR
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2294&min_rtt=2269&rtt_var=869&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1286910&cwnd=220&unsent_bytes=0&cid=100d018390abf6aa&ts=452&x=0"
                                                            2024-12-05 16:03:13 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                            Data Ascii: 8.46.123.228


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:11:02:56
                                                            Start date:05/12/2024
                                                            Path:C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\OHScaqAPjt.exe"
                                                            Imagebase:0x820000
                                                            File size:943'104 bytes
                                                            MD5 hash:17536CC0E75198F811E580990A4F56EF
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2172098106.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2161856213.0000000003C89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OHScaqAPjt.exe"
                                                            Imagebase:0xc10000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                                                            Imagebase:0xc10000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmp9FAF.tmp"
                                                            Imagebase:0xe00000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:11:03:02
                                                            Start date:05/12/2024
                                                            Path:C:\Users\user\Desktop\OHScaqAPjt.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\OHScaqAPjt.exe"
                                                            Imagebase:0x810000
                                                            File size:943'104 bytes
                                                            MD5 hash:17536CC0E75198F811E580990A4F56EF
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3358108714.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3358108714.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3358108714.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:10
                                                            Start time:11:03:04
                                                            Start date:05/12/2024
                                                            Path:C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            Imagebase:0xb00000
                                                            File size:943'104 bytes
                                                            MD5 hash:17536CC0E75198F811E580990A4F56EF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 100%, Avira
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 74%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:11:03:04
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff6ef0c0000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:11:03:10
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PZgxeUcXE" /XML "C:\Users\user\AppData\Local\Temp\tmpBE05.tmp"
                                                            Imagebase:0xe00000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:11:03:10
                                                            Start date:05/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:11:03:10
                                                            Start date:05/12/2024
                                                            Path:C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                                                            Imagebase:0x2e0000
                                                            File size:943'104 bytes
                                                            MD5 hash:17536CC0E75198F811E580990A4F56EF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:15
                                                            Start time:11:03:10
                                                            Start date:05/12/2024
                                                            Path:C:\Users\user\AppData\Roaming\PZgxeUcXE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\PZgxeUcXE.exe"
                                                            Imagebase:0xe10000
                                                            File size:943'104 bytes
                                                            MD5 hash:17536CC0E75198F811E580990A4F56EF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.3357331249.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.3354443541.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.3357331249.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.3357331249.00000000032C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:12%
                                                              Dynamic/Decrypted Code Coverage:95.8%
                                                              Signature Coverage:1.2%
                                                              Total number of Nodes:260
                                                              Total number of Limit Nodes:18
                                                              execution_graph 33887 7430040 33889 7430061 33887->33889 33888 7430079 33889->33888 33892 7430bd8 33889->33892 33896 7430c20 33892->33896 33900 7430c19 33892->33900 33893 743018c 33897 7430c6e DrawTextExW 33896->33897 33899 7430cc6 33897->33899 33899->33893 33901 7430c6e DrawTextExW 33900->33901 33903 7430cc6 33901->33903 33903->33893 34115 11d4668 34116 11d467a 34115->34116 34117 11d4686 34116->34117 34121 11d4779 34116->34121 34126 11d4210 34117->34126 34119 11d46a5 34122 11d479d 34121->34122 34130 11d4879 34122->34130 34134 11d4888 34122->34134 34127 11d421b 34126->34127 34142 11d5c54 34127->34142 34129 11d6fec 34129->34119 34132 11d4888 34130->34132 34131 11d498c 34132->34131 34138 11d44d4 34132->34138 34135 11d48af 34134->34135 34136 11d498c 34135->34136 34137 11d44d4 CreateActCtxA 34135->34137 34137->34136 34139 11d5918 CreateActCtxA 34138->34139 34141 11d59db 34139->34141 34141->34141 34143 11d5c5f 34142->34143 34146 11d5c74 34143->34146 34145 11d7185 34145->34129 34147 11d5c7f 34146->34147 34150 11d5ca4 34147->34150 34149 11d7262 34149->34145 34151 11d5caf 34150->34151 34154 11d5cd4 34151->34154 34153 11d7365 34153->34149 34155 11d5cdf 34154->34155 34157 11d866b 34155->34157 34161 11dad19 34155->34161 34156 11d86a9 34156->34153 34157->34156 34167 11dce18 34157->34167 34173 11dce08 34157->34173 34162 11dad22 34161->34162 34164 11dacbe 34161->34164 34179 11dad3f 34162->34179 34183 11dad50 34162->34183 34163 11dad2e 34163->34157 34164->34157 34169 11dce39 34167->34169 34168 11dce5d 34168->34156 34169->34168 34191 11dcfc8 34169->34191 34195 11dcfc7 34169->34195 34199 11dcf85 34169->34199 34174 11dce18 34173->34174 34175 11dce5d 34174->34175 34176 11dcfc8 GetModuleHandleW 34174->34176 34177 11dcf85 GetModuleHandleW 34174->34177 34178 11dcfc7 GetModuleHandleW 34174->34178 34175->34156 34176->34175 34177->34175 34178->34175 34180 11dad50 34179->34180 34186 11dae38 34180->34186 34181 11dad5f 34181->34163 34185 11dae38 GetModuleHandleW 34183->34185 34184 11dad5f 34184->34163 34185->34184 34187 11dae59 34186->34187 34188 11dae7c 34186->34188 34187->34188 34189 11db080 GetModuleHandleW 34187->34189 34188->34181 34190 11db0ad 34189->34190 34190->34181 34192 11dcf79 34191->34192 34193 11dcf6f 34192->34193 34203 11dbba0 34192->34203 34193->34168 34196 11dcf79 34195->34196 34197 11dcf6f 34196->34197 34198 11dbba0 GetModuleHandleW 34196->34198 34197->34168 34198->34197 34201 11dcf79 34199->34201 34200 11dbba0 GetModuleHandleW 34202 11dcf6f 34200->34202 34201->34199 34201->34200 34201->34202 34202->34168 34204 11dbba5 34203->34204 34206 11ddd28 34204->34206 34207 11dd1c4 34204->34207 34206->34206 34208 11dd1cf 34207->34208 34209 11d5cd4 GetModuleHandleW 34208->34209 34210 11ddd97 34209->34210 34210->34206 34211 11dd4e8 34212 11dd52e 34211->34212 34216 11dd6c8 34212->34216 34219 11dd6b7 34212->34219 34213 11dd61b 34223 11dbbc0 34216->34223 34220 11dd6c8 34219->34220 34221 11dbbc0 DuplicateHandle 34220->34221 34222 11dd6f6 34221->34222 34222->34213 34224 11dd730 DuplicateHandle 34223->34224 34225 11dd6f6 34224->34225 34225->34213 33904 7e74f20 33905 7e74ede 33904->33905 33906 7e74ee8 33905->33906 33911 7e77536 33905->33911 33928 7e77538 33905->33928 33945 7e77528 33905->33945 33963 7e77593 33905->33963 33913 7e77538 33911->33913 33912 7e7755a 33912->33906 33913->33912 33981 7e7818b 33913->33981 33985 7e77a4b 33913->33985 33990 7e77b64 33913->33990 33995 7e77b86 33913->33995 33999 7e77d46 33913->33999 34004 7e77b26 33913->34004 34013 7e77c06 33913->34013 34023 7e779f8 33913->34023 34028 7e77a1a 33913->34028 34033 7e7799e 33913->34033 34040 7e77abf 33913->34040 34044 7e77e94 33913->34044 34049 7e78137 33913->34049 34054 7e77dc9 33913->34054 33929 7e77552 33928->33929 33930 7e7755a 33929->33930 33931 7e77c06 4 API calls 33929->33931 33932 7e77b26 4 API calls 33929->33932 33933 7e77d46 2 API calls 33929->33933 33934 7e77b86 2 API calls 33929->33934 33935 7e77b64 2 API calls 33929->33935 33936 7e77a4b 2 API calls 33929->33936 33937 7e7818b 2 API calls 33929->33937 33938 7e77dc9 2 API calls 33929->33938 33939 7e78137 2 API calls 33929->33939 33940 7e77e94 2 API calls 33929->33940 33941 7e77abf 2 API calls 33929->33941 33942 7e7799e 4 API calls 33929->33942 33943 7e77a1a 2 API calls 33929->33943 33944 7e779f8 2 API calls 33929->33944 33930->33906 33931->33930 33932->33930 33933->33930 33934->33930 33935->33930 33936->33930 33937->33930 33938->33930 33939->33930 33940->33930 33941->33930 33942->33930 33943->33930 33944->33930 33946 7e77536 12 API calls 33945->33946 33947 7e7752f 33946->33947 33948 7e7755a 33947->33948 33949 7e77c06 4 API calls 33947->33949 33950 7e77b26 4 API calls 33947->33950 33951 7e77d46 2 API calls 33947->33951 33952 7e77b86 2 API calls 33947->33952 33953 7e77b64 2 API calls 33947->33953 33954 7e77a4b 2 API calls 33947->33954 33955 7e7818b 2 API calls 33947->33955 33956 7e77dc9 2 API calls 33947->33956 33957 7e78137 2 API calls 33947->33957 33958 7e77e94 2 API calls 33947->33958 33959 7e77abf 2 API calls 33947->33959 33960 7e7799e 4 API calls 33947->33960 33961 7e77a1a 2 API calls 33947->33961 33962 7e779f8 2 API calls 33947->33962 33948->33906 33949->33948 33950->33948 33951->33948 33952->33948 33953->33948 33954->33948 33955->33948 33956->33948 33957->33948 33958->33948 33959->33948 33960->33948 33961->33948 33962->33948 33964 7e77577 33963->33964 33966 7e77596 33963->33966 33967 7e77c06 4 API calls 33964->33967 33968 7e77b26 4 API calls 33964->33968 33969 7e77d46 2 API calls 33964->33969 33970 7e77b86 2 API calls 33964->33970 33971 7e77b64 2 API calls 33964->33971 33972 7e77a4b 2 API calls 33964->33972 33973 7e7818b 2 API calls 33964->33973 33974 7e77dc9 2 API calls 33964->33974 33975 7e78137 2 API calls 33964->33975 33976 7e77e94 2 API calls 33964->33976 33977 7e77abf 2 API calls 33964->33977 33978 7e7799e 4 API calls 33964->33978 33979 7e77a1a 2 API calls 33964->33979 33980 7e779f8 2 API calls 33964->33980 33965 7e7755a 33965->33906 33967->33965 33968->33965 33969->33965 33970->33965 33971->33965 33972->33965 33973->33965 33974->33965 33975->33965 33976->33965 33977->33965 33978->33965 33979->33965 33980->33965 34059 7e74808 33981->34059 34063 7e74801 33981->34063 33982 7e781b9 33986 7e77a01 33985->33986 33987 7e77a13 33986->33987 33988 7e74801 WriteProcessMemory 33986->33988 33989 7e74808 WriteProcessMemory 33986->33989 33988->33986 33989->33986 33991 7e77b6e 33990->33991 33992 7e78144 33991->33992 34067 7e74181 33991->34067 34071 7e74188 33991->34071 34075 7e74740 33995->34075 34079 7e74748 33995->34079 33996 7e77ba4 34000 7e77a01 33999->34000 34000->33999 34001 7e77a13 34000->34001 34002 7e74801 WriteProcessMemory 34000->34002 34003 7e74808 WriteProcessMemory 34000->34003 34002->34000 34003->34000 34005 7e77b40 34004->34005 34007 7e77b7f 34004->34007 34083 7e74230 34005->34083 34087 7e74238 34005->34087 34006 7e7827c 34008 7e78144 34007->34008 34009 7e74181 ResumeThread 34007->34009 34010 7e74188 ResumeThread 34007->34010 34008->33912 34009->34007 34010->34007 34014 7e77b33 34013->34014 34015 7e77b40 34014->34015 34017 7e77b7f 34014->34017 34019 7e74230 Wow64SetThreadContext 34015->34019 34020 7e74238 Wow64SetThreadContext 34015->34020 34016 7e7827c 34018 7e78144 34017->34018 34021 7e74181 ResumeThread 34017->34021 34022 7e74188 ResumeThread 34017->34022 34018->33912 34019->34016 34020->34016 34021->34017 34022->34017 34025 7e77a01 34023->34025 34024 7e77a13 34025->34024 34026 7e74801 WriteProcessMemory 34025->34026 34027 7e74808 WriteProcessMemory 34025->34027 34026->34025 34027->34025 34029 7e77a39 34028->34029 34031 7e74801 WriteProcessMemory 34029->34031 34032 7e74808 WriteProcessMemory 34029->34032 34030 7e77f8b 34031->34030 34032->34030 34091 7e74a84 34033->34091 34095 7e74a90 34033->34095 34042 7e74230 Wow64SetThreadContext 34040->34042 34043 7e74238 Wow64SetThreadContext 34040->34043 34041 7e77ad9 34041->33912 34042->34041 34043->34041 34045 7e77b7f 34044->34045 34046 7e78144 34045->34046 34047 7e74181 ResumeThread 34045->34047 34048 7e74188 ResumeThread 34045->34048 34047->34045 34048->34045 34050 7e78144 34049->34050 34051 7e77b7f 34049->34051 34051->34049 34052 7e74181 ResumeThread 34051->34052 34053 7e74188 ResumeThread 34051->34053 34052->34051 34053->34051 34055 7e77dcf 34054->34055 34099 7e748f1 34055->34099 34103 7e748f8 34055->34103 34056 7e77cd1 34060 7e74850 WriteProcessMemory 34059->34060 34062 7e748a7 34060->34062 34062->33982 34064 7e74807 WriteProcessMemory 34063->34064 34066 7e748a7 34064->34066 34066->33982 34068 7e74187 ResumeThread 34067->34068 34070 7e741f9 34068->34070 34070->33991 34072 7e741c8 ResumeThread 34071->34072 34074 7e741f9 34072->34074 34074->33991 34076 7e74788 VirtualAllocEx 34075->34076 34078 7e747c5 34076->34078 34078->33996 34080 7e74788 VirtualAllocEx 34079->34080 34082 7e747c5 34080->34082 34082->33996 34084 7e74235 Wow64SetThreadContext 34083->34084 34086 7e742c5 34084->34086 34086->34006 34088 7e7427d Wow64SetThreadContext 34087->34088 34090 7e742c5 34088->34090 34090->34006 34092 7e74a8b CreateProcessA 34091->34092 34094 7e74cdb 34092->34094 34096 7e74b19 CreateProcessA 34095->34096 34098 7e74cdb 34096->34098 34100 7e748f7 ReadProcessMemory 34099->34100 34102 7e74987 34100->34102 34102->34056 34104 7e74943 ReadProcessMemory 34103->34104 34106 7e74987 34104->34106 34106->34056 34107 7e786a8 34108 7e78833 34107->34108 34110 7e786ce 34107->34110 34110->34108 34111 7e73134 34110->34111 34113 7e78d30 34111->34113 34112 7e78d89 PostMessageW 34112->34113 34113->34112 34114 7e78dad 34113->34114 34114->34110

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 294 74374a0-74374c1 295 74374c3 294->295 296 74374c8-74375b4 294->296 295->296 298 74375ba-7437705 call 7437408 296->298 299 7437dd9-7437e01 296->299 345 7437da6-7437dd7 298->345 346 743770b-7437766 298->346 302 74384d0-74384d9 299->302 303 7437e0f-7437e18 302->303 304 74384df-74384f6 302->304 306 7437e1a 303->306 307 7437e1f-7437f0f call 7437408 303->307 306->307 327 7437f11-7437f1d 307->327 328 7437f39 307->328 330 7437f27-7437f2d 327->330 331 7437f1f-7437f25 327->331 332 7437f3f-7437f5f 328->332 334 7437f37 330->334 331->334 336 7437f61-7437fb8 332->336 337 7437fbd-7438035 332->337 334->332 349 74384cd 336->349 356 7438037-7438088 337->356 357 743808a-74380cd call 7437408 337->357 345->299 353 743776b-7437776 346->353 354 7437768 346->354 349->302 358 7437cba-7437cc0 353->358 354->353 388 74380d8-74380de 356->388 357->388 359 7437cc6-7437d43 358->359 360 743777b-7437799 358->360 402 7437d90-7437d96 359->402 364 74377f0-7437805 360->364 365 743779b-743779f 360->365 367 7437807 364->367 368 743780c-7437822 364->368 365->364 370 74377a1-74377ac 365->370 367->368 373 7437824 368->373 374 7437829-7437840 368->374 376 74377e2-74377e8 370->376 373->374 380 7437842 374->380 381 7437847-743785d 374->381 378 74377ea-74377eb 376->378 379 74377ae-74377b2 376->379 382 743786e-74378df 378->382 384 74377b4 379->384 385 74377b8-74377d0 379->385 380->381 386 7437864-743786b 381->386 387 743785f 381->387 389 74378e1 382->389 390 74378f5-7437a6d 382->390 384->385 392 74377d2 385->392 393 74377d7-74377df 385->393 386->382 387->386 394 7438133-743813f 388->394 389->390 395 74378e3-74378ef 389->395 403 7437a83-7437bbe 390->403 404 7437a6f 390->404 392->393 393->376 396 7438141-74381c7 394->396 397 74380e0-7438102 394->397 395->390 424 7438346-743834f 396->424 398 7438104 397->398 399 7438109-7438130 397->399 398->399 399->394 407 7437d45-7437d8d 402->407 408 7437d98-7437d9e 402->408 417 7437c22-7437c37 403->417 418 7437bc0-7437bc4 403->418 404->403 409 7437a71-7437a7d 404->409 407->402 408->345 409->403 420 7437c39 417->420 421 7437c3e-7437c5f 417->421 418->417 422 7437bc6-7437bd5 418->422 420->421 426 7437c61 421->426 427 7437c66-7437c85 421->427 423 7437c14-7437c1a 422->423 428 7437bd7-7437bdb 423->428 429 7437c1c-7437c1d 423->429 430 7438355-74383b0 424->430 431 74381cc-74381e1 424->431 426->427 432 7437c87 427->432 433 7437c8c-7437cac 427->433 434 7437be5-7437c06 428->434 435 7437bdd-7437be1 428->435 440 7437cb7 429->440 455 74383b2-74383e5 430->455 456 74383e7-7438411 430->456 436 74381e3 431->436 437 74381ea-7438334 431->437 432->433 438 7437cb3 433->438 439 7437cae 433->439 442 7437c08 434->442 443 7437c0d-7437c11 434->443 435->434 436->437 444 7438233-7438273 436->444 445 74381f0-743822e 436->445 446 74382bb-74382fb 436->446 447 7438278-74382b6 436->447 460 7438340 437->460 438->440 439->438 440->358 442->443 443->423 444->460 445->460 446->460 447->460 464 743841a-74384a3 455->464 456->464 460->424 469 74384a9 call 7438ed8 464->469 470 74384a9 call 7438ee8 464->470 468 74384af-74384c1 468->349 469->468 470->468
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'eq$TJjq$Teeq$piq$xbhq
                                                              • API String ID: 0-2068930973
                                                              • Opcode ID: 4bf51b94883a143c08dc3dfd9bc8cd3fbb3961e089a46e9edc1e116ef09354d6
                                                              • Instruction ID: 9c5385af91a06dc7464929f6d8cc18d742c1c950404feaac686f9414f26a03cf
                                                              • Opcode Fuzzy Hash: 4bf51b94883a143c08dc3dfd9bc8cd3fbb3961e089a46e9edc1e116ef09354d6
                                                              • Instruction Fuzzy Hash: A0B2C5B5D00228CFDB65CF69C984AD9BBB2BF89304F1581E9E50DA7265DB319E81CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4345f0d304a3d6bb5bfc7999a0814126233b282bbd81496bcec5ec8d89547ab7
                                                              • Instruction ID: ae39d01c8c4ee6afa5a2bdf71c33ff9cb2cc4659d12de0d0fc76acfc85d52549
                                                              • Opcode Fuzzy Hash: 4345f0d304a3d6bb5bfc7999a0814126233b282bbd81496bcec5ec8d89547ab7
                                                              • Instruction Fuzzy Hash: 6D32BDB0B022059FDB19DF79D454BAEBBF6AF88308F148469E1069B3A1CB35ED41CB51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 629732c88e0d41d6880f81c1ac81edb207164cabf3c363183b9c15539912fcf1
                                                              • Instruction ID: a9e205e2543bbf3ea688611a92e4d85df1724d0de122e7568e344c9c7e146910
                                                              • Opcode Fuzzy Hash: 629732c88e0d41d6880f81c1ac81edb207164cabf3c363183b9c15539912fcf1
                                                              • Instruction Fuzzy Hash: 7AC1C171A007068FDB18DF69D944BAEBBF6FF88304F148469E506AB3A1DB349D46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 070b9949f79c61e182252c3d85a20af53f156185cd5557f212300497bef87c09
                                                              • Instruction ID: 09470661a576f1451dcffc00ac64dd90a64d591c7edcf0a67e469ab76f04f818
                                                              • Opcode Fuzzy Hash: 070b9949f79c61e182252c3d85a20af53f156185cd5557f212300497bef87c09
                                                              • Instruction Fuzzy Hash: 39D107B0E44228CFEB64DFA5C8487DEBBB1FB49304F1081AAE45DA7241D7781A86CF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a6cd5ddf594f7d03e800e7892f90c9741320592f81871cb4e4c51174e26f7d85
                                                              • Instruction ID: 55f14fc775e779f69b5aec414e67624a75383cf8ebcd9d48ec8fcdb6473a3511
                                                              • Opcode Fuzzy Hash: a6cd5ddf594f7d03e800e7892f90c9741320592f81871cb4e4c51174e26f7d85
                                                              • Instruction Fuzzy Hash: 0FD108B0E44228CFEB64DFA5C8487DEBBB1FB89304F1091AAE45DA7241D7741A86CF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6bf2ba4de83cb2638a21b158ac50fe4af9037ec6f802741b1635bcf33fbad2b9
                                                              • Instruction ID: 7a0dc8485f07e2d85f6823d82b79905bd18969e0ab6b2a24e1a41cefa471e2ad
                                                              • Opcode Fuzzy Hash: 6bf2ba4de83cb2638a21b158ac50fe4af9037ec6f802741b1635bcf33fbad2b9
                                                              • Instruction Fuzzy Hash: B32113B0D156189BEB18CFABC9457EEFAF6AFC9300F14C02AD40C66264DB74194A8F90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c6174b7f13fd308cdf642492adf68cc33fb03ce709da472e9a2eca9d7472e4c9
                                                              • Instruction ID: 696b5c2f15be038e9bab218cc08a31572765130682b11545eb803400c6037396
                                                              • Opcode Fuzzy Hash: c6174b7f13fd308cdf642492adf68cc33fb03ce709da472e9a2eca9d7472e4c9
                                                              • Instruction Fuzzy Hash: E221C6B0D156188BEB18CF9BC9457EEFAF6AFCD300F14C02AD50D66264DB74094A8F90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 542 7e74a84-7e74b25 546 7e74b27-7e74b31 542->546 547 7e74b5e-7e74b7e 542->547 546->547 548 7e74b33-7e74b35 546->548 554 7e74bb7-7e74be6 547->554 555 7e74b80-7e74b8a 547->555 549 7e74b37-7e74b41 548->549 550 7e74b58-7e74b5b 548->550 552 7e74b45-7e74b54 549->552 553 7e74b43 549->553 550->547 552->552 556 7e74b56 552->556 553->552 561 7e74c1f-7e74cd9 CreateProcessA 554->561 562 7e74be8-7e74bf2 554->562 555->554 557 7e74b8c-7e74b8e 555->557 556->550 559 7e74bb1-7e74bb4 557->559 560 7e74b90-7e74b9a 557->560 559->554 563 7e74b9e-7e74bad 560->563 564 7e74b9c 560->564 575 7e74ce2-7e74d68 561->575 576 7e74cdb-7e74ce1 561->576 562->561 566 7e74bf4-7e74bf6 562->566 563->563 565 7e74baf 563->565 564->563 565->559 567 7e74c19-7e74c1c 566->567 568 7e74bf8-7e74c02 566->568 567->561 570 7e74c06-7e74c15 568->570 571 7e74c04 568->571 570->570 573 7e74c17 570->573 571->570 573->567 586 7e74d6a-7e74d6e 575->586 587 7e74d78-7e74d7c 575->587 576->575 586->587 588 7e74d70 586->588 589 7e74d7e-7e74d82 587->589 590 7e74d8c-7e74d90 587->590 588->587 589->590 591 7e74d84 589->591 592 7e74d92-7e74d96 590->592 593 7e74da0-7e74da4 590->593 591->590 592->593 596 7e74d98 592->596 594 7e74db6-7e74dbd 593->594 595 7e74da6-7e74dac 593->595 597 7e74dd4 594->597 598 7e74dbf-7e74dce 594->598 595->594 596->593 600 7e74dd5 597->600 598->597 600->600
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07E74CC6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 0c28db9976f3d95ddb787089153d3f0bddcba5b824efed88185cc726c0615057
                                                              • Instruction ID: fde2b5a7d93bd515a8de2f6ebab77e70d40e538564c412a036ad4934f0bc3121
                                                              • Opcode Fuzzy Hash: 0c28db9976f3d95ddb787089153d3f0bddcba5b824efed88185cc726c0615057
                                                              • Instruction Fuzzy Hash: 1FA16BB1D0165ACFDB20CFA8C881BEDBBB2FF49314F148169D818A7290DB749985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 601 7e74a90-7e74b25 603 7e74b27-7e74b31 601->603 604 7e74b5e-7e74b7e 601->604 603->604 605 7e74b33-7e74b35 603->605 611 7e74bb7-7e74be6 604->611 612 7e74b80-7e74b8a 604->612 606 7e74b37-7e74b41 605->606 607 7e74b58-7e74b5b 605->607 609 7e74b45-7e74b54 606->609 610 7e74b43 606->610 607->604 609->609 613 7e74b56 609->613 610->609 618 7e74c1f-7e74cd9 CreateProcessA 611->618 619 7e74be8-7e74bf2 611->619 612->611 614 7e74b8c-7e74b8e 612->614 613->607 616 7e74bb1-7e74bb4 614->616 617 7e74b90-7e74b9a 614->617 616->611 620 7e74b9e-7e74bad 617->620 621 7e74b9c 617->621 632 7e74ce2-7e74d68 618->632 633 7e74cdb-7e74ce1 618->633 619->618 623 7e74bf4-7e74bf6 619->623 620->620 622 7e74baf 620->622 621->620 622->616 624 7e74c19-7e74c1c 623->624 625 7e74bf8-7e74c02 623->625 624->618 627 7e74c06-7e74c15 625->627 628 7e74c04 625->628 627->627 630 7e74c17 627->630 628->627 630->624 643 7e74d6a-7e74d6e 632->643 644 7e74d78-7e74d7c 632->644 633->632 643->644 645 7e74d70 643->645 646 7e74d7e-7e74d82 644->646 647 7e74d8c-7e74d90 644->647 645->644 646->647 648 7e74d84 646->648 649 7e74d92-7e74d96 647->649 650 7e74da0-7e74da4 647->650 648->647 649->650 653 7e74d98 649->653 651 7e74db6-7e74dbd 650->651 652 7e74da6-7e74dac 650->652 654 7e74dd4 651->654 655 7e74dbf-7e74dce 651->655 652->651 653->650 657 7e74dd5 654->657 655->654 657->657
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07E74CC6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: f8005520471ff71199146c3ad6b26817b9e9eed10df358dfca1e71b1a45f0146
                                                              • Instruction ID: 5a1acd93e288233e3621e4486f4fef3f0f0c293bee87e30dd684afec59618557
                                                              • Opcode Fuzzy Hash: f8005520471ff71199146c3ad6b26817b9e9eed10df358dfca1e71b1a45f0146
                                                              • Instruction Fuzzy Hash: 72916CB1D0165ACFDB24CFA8C880BEDBBB2FF49314F148169D858A7290DB749985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 658 11dae38-11dae57 659 11dae59-11dae66 call 11d97c0 658->659 660 11dae83-11dae87 658->660 665 11dae7c 659->665 666 11dae68 659->666 661 11dae89-11dae93 660->661 662 11dae9b-11daedc 660->662 661->662 669 11daede-11daee6 662->669 670 11daee9-11daef7 662->670 665->660 713 11dae6e call 11db0d0 666->713 714 11dae6e call 11db0e0 666->714 669->670 672 11daef9-11daefe 670->672 673 11daf1b-11daf1d 670->673 671 11dae74-11dae76 671->665 676 11dafb8-11db078 671->676 674 11daf09 672->674 675 11daf00-11daf07 call 11da190 672->675 677 11daf20-11daf27 673->677 679 11daf0b-11daf19 674->679 675->679 708 11db07a-11db07d 676->708 709 11db080-11db0ab GetModuleHandleW 676->709 680 11daf29-11daf31 677->680 681 11daf34-11daf3b 677->681 679->677 680->681 683 11daf3d-11daf45 681->683 684 11daf48-11daf51 call 11da1a0 681->684 683->684 689 11daf5e-11daf63 684->689 690 11daf53-11daf5b 684->690 692 11daf65-11daf6c 689->692 693 11daf81-11daf8e 689->693 690->689 692->693 694 11daf6e-11daf7e call 11da1b0 call 11da1c0 692->694 699 11dafb1-11dafb7 693->699 700 11daf90-11dafae 693->700 694->693 700->699 708->709 710 11db0ad-11db0b3 709->710 711 11db0b4-11db0c8 709->711 710->711 713->671 714->671
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 011DB09E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 119feee119eccd2e3fb08d04e84291b9addb203775bd98e060b69f9f692b1b0c
                                                              • Instruction ID: 7d30d7a108d45930cf9dafb12b27df88e20253713fe38ab4d3ca3f76d70cf9ef
                                                              • Opcode Fuzzy Hash: 119feee119eccd2e3fb08d04e84291b9addb203775bd98e060b69f9f692b1b0c
                                                              • Instruction Fuzzy Hash: EA8166B0A00B058FE728DF29D44475ABBF1FF88304F008A6DE49AD7A80D774E945CB95

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 715 11d44d4-11d59d9 CreateActCtxA 718 11d59db-11d59e1 715->718 719 11d59e2-11d5a3c 715->719 718->719 726 11d5a3e-11d5a41 719->726 727 11d5a4b-11d5a4f 719->727 726->727 728 11d5a51-11d5a5d 727->728 729 11d5a60 727->729 728->729 731 11d5a61 729->731 731->731
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 011D59C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 4bd4c2026eac89650822615bd32e8fd7f9fd2017fe03d3b4adad943cdbc41a6f
                                                              • Instruction ID: b8289ff36fe2e3b0d2d1606c46164de1db9d752be2457d8d3bada6bf6d74be4f
                                                              • Opcode Fuzzy Hash: 4bd4c2026eac89650822615bd32e8fd7f9fd2017fe03d3b4adad943cdbc41a6f
                                                              • Instruction Fuzzy Hash: 8C41E2B0C0071DCBDB28CFA9C884B9DBBF6BF49304F60816AD508AB251DB756949CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 732 11d590c-11d59d9 CreateActCtxA 734 11d59db-11d59e1 732->734 735 11d59e2-11d5a3c 732->735 734->735 742 11d5a3e-11d5a41 735->742 743 11d5a4b-11d5a4f 735->743 742->743 744 11d5a51-11d5a5d 743->744 745 11d5a60 743->745 744->745 747 11d5a61 745->747 747->747
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 011D59C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: c2fd6fe98265cc52836336ce5ee4585c59f140c12b4b08e06985b0ee88569cbb
                                                              • Instruction ID: 2fd43ea43c482124426ad43dcb475ec51fee97a0ac745ba84f5b308321debc7d
                                                              • Opcode Fuzzy Hash: c2fd6fe98265cc52836336ce5ee4585c59f140c12b4b08e06985b0ee88569cbb
                                                              • Instruction Fuzzy Hash: 4341DFB4C00719CFDB28CFA9C984B9DBBF2BF49304F24816AD408AB251DB756949CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 748 7e74801-7e74856 752 7e74866-7e748a5 WriteProcessMemory 748->752 753 7e74858-7e74864 748->753 755 7e748a7-7e748ad 752->755 756 7e748ae-7e748de 752->756 753->752 755->756
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07E74898
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 1e94fa5ea87469189115d2762b2051980bf43bfd0d9948765346ccfd29baa4e2
                                                              • Instruction ID: 37c9ede2653e4a5800cb611e0c3260c8f734d172435a9dc8a00402ce79e377ad
                                                              • Opcode Fuzzy Hash: 1e94fa5ea87469189115d2762b2051980bf43bfd0d9948765346ccfd29baa4e2
                                                              • Instruction Fuzzy Hash: EE214BB59003599FDB10CFA9C9857DEBBF5FF48320F10882AE918A7280C7749544CBA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 760 7430c19-7430c6c 761 7430c77-7430c86 760->761 762 7430c6e-7430c74 760->762 763 7430c8b-7430cc4 DrawTextExW 761->763 764 7430c88 761->764 762->761 765 7430cc6-7430ccc 763->765 766 7430ccd-7430cea 763->766 764->763 765->766
                                                              APIs
                                                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07430CB7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: DrawText
                                                              • String ID:
                                                              • API String ID: 2175133113-0
                                                              • Opcode ID: 0680fa2722619927ac5efe803fe22c9a72e34425547be3543dd1e72a277f1fd3
                                                              • Instruction ID: aafefb98a21a7726df9005c9fc7758d08e9ab066d4529dadcfc0e8f549ccfc46
                                                              • Opcode Fuzzy Hash: 0680fa2722619927ac5efe803fe22c9a72e34425547be3543dd1e72a277f1fd3
                                                              • Instruction Fuzzy Hash: 6231E2B590024A9FDB14CF99D884ADEFBF5EB48320F14852AE819A7350C374A544CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 778 7e74808-7e74856 780 7e74866-7e748a5 WriteProcessMemory 778->780 781 7e74858-7e74864 778->781 783 7e748a7-7e748ad 780->783 784 7e748ae-7e748de 780->784 781->780 783->784
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07E74898
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: da69ab4f0590df5ea322782776f275513a31c9b640a219e37a9db0f37dc237db
                                                              • Instruction ID: b30818c161deac038c0174fcc53f5687caac5d718cac2dde876e368a4aefc973
                                                              • Opcode Fuzzy Hash: da69ab4f0590df5ea322782776f275513a31c9b640a219e37a9db0f37dc237db
                                                              • Instruction Fuzzy Hash: E3212AB190035D9FDB10CFA9C985BDEBBF5FF49310F10842AE919A7241D7749944DBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 769 7430c20-7430c6c 770 7430c77-7430c86 769->770 771 7430c6e-7430c74 769->771 772 7430c8b-7430cc4 DrawTextExW 770->772 773 7430c88 770->773 771->770 774 7430cc6-7430ccc 772->774 775 7430ccd-7430cea 772->775 773->772 774->775
                                                              APIs
                                                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07430CB7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: DrawText
                                                              • String ID:
                                                              • API String ID: 2175133113-0
                                                              • Opcode ID: 59c42dc640f6bad2236c2ff954ee047d3c88e1b8387561c795fe6255f592df2d
                                                              • Instruction ID: 93b60a49f46bd7a1dce07b4e193704926de32c60c46280780bf6bdcd425cd5b7
                                                              • Opcode Fuzzy Hash: 59c42dc640f6bad2236c2ff954ee047d3c88e1b8387561c795fe6255f592df2d
                                                              • Instruction Fuzzy Hash: CC21EEB590024A9FDB10CF9AD884ADEFBF5EB48320F14842AE819A7310C375A944CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 788 7e748f1-7e74985 ReadProcessMemory 793 7e74987-7e7498d 788->793 794 7e7498e-7e749be 788->794 793->794
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07E74978
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 2e9f21be845da796392ba7ca28a7e9cf9bbd76754b3cc79cfec764ddf3dc086e
                                                              • Instruction ID: 870e0636ab1500c71cce6faef8c8cc311878a2e1a7f12a00078fbfd50c228356
                                                              • Opcode Fuzzy Hash: 2e9f21be845da796392ba7ca28a7e9cf9bbd76754b3cc79cfec764ddf3dc086e
                                                              • Instruction Fuzzy Hash: B5215EB1C003599FCB10CFA9C881ADEFBF5FF48320F50842AE518A7250C7349540DBA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 798 11dbbc0-11dd7c4 DuplicateHandle 800 11dd7cd-11dd7ea 798->800 801 11dd7c6-11dd7cc 798->801 801->800
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011DD6F6,?,?,?,?,?), ref: 011DD7B7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 5bbe98829fea73a413df9682936a34c978af1a6c0715874a6b3d694b3c53a33a
                                                              • Instruction ID: 0de66eb5c5bbde597722ad68ac63fedd6bb181c779f5530894a0d07bc9f5bcf7
                                                              • Opcode Fuzzy Hash: 5bbe98829fea73a413df9682936a34c978af1a6c0715874a6b3d694b3c53a33a
                                                              • Instruction Fuzzy Hash: 8A2114B5900248EFDB10CF9AD984ADEBFF8EB48320F14845AE918B7350C374A940CFA4
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07E742B6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 490ed253cd556ba22eafac71f1388694f27a460936a808b38fd1e161090eeb02
                                                              • Instruction ID: 2a01a59cd6b3d6cc6d2776998db90d28ad11529016a69d33b43ef8f15beb2a7c
                                                              • Opcode Fuzzy Hash: 490ed253cd556ba22eafac71f1388694f27a460936a808b38fd1e161090eeb02
                                                              • Instruction Fuzzy Hash: AE2168B5D002498FDB10CFAAC5847EEBFF5EF49324F54842AD519A7241CB789944CFA0
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07E742B6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 8f437027db00466bfc1e9b696cd4e7ea1f227bc61e61b967006badbea66aaf4c
                                                              • Instruction ID: 2df5884a4d8dfc121d6b9595f56f31c0e117c5a99b0230feee1bfffa19c66b7a
                                                              • Opcode Fuzzy Hash: 8f437027db00466bfc1e9b696cd4e7ea1f227bc61e61b967006badbea66aaf4c
                                                              • Instruction Fuzzy Hash: 4F2138B1D003498FDB10DFAAC4857AEBBF4EF49324F54842AD419A7241DB789944CFA0
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07E74978
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 442dee7b6c957d6026a79bcf0a8115e3f4dc93a29055e63370d216ad77f2dbc5
                                                              • Instruction ID: 1ffa2ba327c0e96284a98e0a26784af972f043527984080740829fab2e82004e
                                                              • Opcode Fuzzy Hash: 442dee7b6c957d6026a79bcf0a8115e3f4dc93a29055e63370d216ad77f2dbc5
                                                              • Instruction Fuzzy Hash: E12139B1C003599FCB10CFAAC885AEEFBF5FF48320F50842AE519A7250C7399944DBA0
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011DD6F6,?,?,?,?,?), ref: 011DD7B7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: b233b5d264f8cdafa0b6a5b645451974af4c0d6aea45991841c15d86d72d6554
                                                              • Instruction ID: d1756d58e244ef5019d6d685177a1f933c096fe3c715687853b1288e27b16244
                                                              • Opcode Fuzzy Hash: b233b5d264f8cdafa0b6a5b645451974af4c0d6aea45991841c15d86d72d6554
                                                              • Instruction Fuzzy Hash: A621E3B59002499FDB10CF99D984ADEBBF5FB48314F15845AE918A7350D374A944CF60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7001b07aa4750810e441c81e39a3aec8c249c8bcd4e017f516a8de19faa94b3c
                                                              • Instruction ID: 518992134f023a9484b3bbc6a91bd7ce4d245c25e51e23a9cdd918eec62bc325
                                                              • Opcode Fuzzy Hash: 7001b07aa4750810e441c81e39a3aec8c249c8bcd4e017f516a8de19faa94b3c
                                                              • Instruction Fuzzy Hash: A721E1B29062298FDB24DBA9D9487EEBBF5AF64314F148459C545F7280CB396D80CBA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07E747B6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: de9829184503cdbce208c1b6f5f6dbe57ce846520c5944702a5b6a4d10406829
                                                              • Instruction ID: 63785170505a988dd8574561c951811343ca124b399a7849b1ef220dce33acbb
                                                              • Opcode Fuzzy Hash: de9829184503cdbce208c1b6f5f6dbe57ce846520c5944702a5b6a4d10406829
                                                              • Instruction Fuzzy Hash: 80117C76D002899FCB10CFA9C944ADEBFF5EF49324F148419D919A7250CB759544DFA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07E747B6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 7a382d5235c93e511ce5e748b539e4694034d7c66bba6204a757eadce22c9972
                                                              • Instruction ID: e64d3e7649e6c22488b6ef92b45a1a66f5b7cf960d16828897e1541f260ebe59
                                                              • Opcode Fuzzy Hash: 7a382d5235c93e511ce5e748b539e4694034d7c66bba6204a757eadce22c9972
                                                              • Instruction Fuzzy Hash: 631179728002499FCB10DFAAC844ADFBFF9EF89320F148819E519A7250CB35A940CFA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 39af48ef40ea522a11b233bcd41fb01b8808ef8ece1b785f4bf3b159b51ca611
                                                              • Instruction ID: 06922f50aca224280d28e14f5263f168685ea515a104f9634c02ed4e00377bb9
                                                              • Opcode Fuzzy Hash: 39af48ef40ea522a11b233bcd41fb01b8808ef8ece1b785f4bf3b159b51ca611
                                                              • Instruction Fuzzy Hash: FA115BB59003498FDB20DFAAD8457DEFBF4EF89324F248419D429A7280CB756544CBA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 8b55674a3507118c0155cfd33af200e4f276c0bcf6fb58919114f851ad228432
                                                              • Instruction ID: a428609dedd2d7698f7d87e8364b5a3be8ef7bf742c862c1f798f9b4c3eedf74
                                                              • Opcode Fuzzy Hash: 8b55674a3507118c0155cfd33af200e4f276c0bcf6fb58919114f851ad228432
                                                              • Instruction Fuzzy Hash: 82113AB5D003498FDB20DFAAD84579EFBF8EF89324F248419D519A7240CB756944CBA4
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 011DB09E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 7e2fd726c26550b4be59f97d0f37caf5c5741a8d34a60f6d5efb923be47eb82b
                                                              • Instruction ID: 2472050f0bd18c2d13c3b09ac3ec2a2538e9eb5a2d86dfe287dc750479a76256
                                                              • Opcode Fuzzy Hash: 7e2fd726c26550b4be59f97d0f37caf5c5741a8d34a60f6d5efb923be47eb82b
                                                              • Instruction Fuzzy Hash: 7E110FB6C002498FDB24CF9AC844A9EFBF4EB89324F10841AD929A7200D379A545CFA5
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07E78D8D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 3f897e158b64ca66d754988353b94f941e57daabdc04d5c095fe41bdce9c94ef
                                                              • Instruction ID: dacd96940892a9198a1cbd562b84442413dd93870ff70c95b27bd48677125350
                                                              • Opcode Fuzzy Hash: 3f897e158b64ca66d754988353b94f941e57daabdc04d5c095fe41bdce9c94ef
                                                              • Instruction Fuzzy Hash: 31110AB58003499FDB20DF9AD889BDEFBF8EB58320F108519D524A7640C375A944CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07E78D8D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 5bd75704d04430082ad5e43eff3b1596e236c20412ff173c21572a39b536bf64
                                                              • Instruction ID: 184fda121c231161b7149b0fd3dab9b275690d037268ce2cb5621caed418f9b8
                                                              • Opcode Fuzzy Hash: 5bd75704d04430082ad5e43eff3b1596e236c20412ff173c21572a39b536bf64
                                                              • Instruction Fuzzy Hash: 5F1106B5801349DFCB10DF9AC989BDEBBF8EB58320F108459E518A7600C375A944CFA5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159296127.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_eed000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf5b08422b039d04b8fc5e138025357b2f592260d121214a20139be364e41896
                                                              • Instruction ID: 4429155d54b31b20a82fb25d0bdad91d9e7f3dd2525cfee71792ed98c92edb2c
                                                              • Opcode Fuzzy Hash: cf5b08422b039d04b8fc5e138025357b2f592260d121214a20139be364e41896
                                                              • Instruction Fuzzy Hash: 5A216A71108288DFCB01DF04DDC0B16BF65FBA8324F20C56CE8095B28AC336E816C7A2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159421527.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f0d000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e925596b220839b4d75fe1bcc308466a75aff52a34d29bf8e808ad80e6e08382
                                                              • Instruction ID: 5f8302427b4e4f9135fbc53b953fc2b91318b4fd6166a5efe107237456669533
                                                              • Opcode Fuzzy Hash: e925596b220839b4d75fe1bcc308466a75aff52a34d29bf8e808ad80e6e08382
                                                              • Instruction Fuzzy Hash: 79212671904304EFDB05DF94D9C0B26BBA5FB88324F24C96DE8094B2D6C33AD806EA61
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159421527.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f0d000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 306187569f7cad9192f69e452667f631978d45445f6b5e67032073dc7e56909c
                                                              • Instruction ID: 72e10be67f1676629d519f053a993eafe643f0a4466201431729c18e84809e9c
                                                              • Opcode Fuzzy Hash: 306187569f7cad9192f69e452667f631978d45445f6b5e67032073dc7e56909c
                                                              • Instruction Fuzzy Hash: 46210476604200DFDB15DF54D9C4B26BB65FB88324F24C96DD80E4B28AC33BD807EA62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159421527.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f0d000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c6ef284407e3d481e15d79cb7b0e53cef32d94cd8a4bf519fc78f3e5d38e81c9
                                                              • Instruction ID: 67b88f0ca31a91501acd77cc5712d4e46ebab9a61791edf446d4ac77fb4c6667
                                                              • Opcode Fuzzy Hash: c6ef284407e3d481e15d79cb7b0e53cef32d94cd8a4bf519fc78f3e5d38e81c9
                                                              • Instruction Fuzzy Hash: D3218E755093808FCB02CF24D994715BF71EB46324F28C5EAD8498B6A7C33A980ADB62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159296127.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_eed000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                                              • Instruction ID: f1b1ba54512cc6ae6a225f7b169ef77fd25da10ae8dbbdce98a461b21c9c2bb9
                                                              • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                                              • Instruction Fuzzy Hash: D4112676404284CFCB12CF00D9C4B16BF71FBA4324F24C2A9D8091B256C33AE85ACBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159421527.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f0d000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                                              • Instruction ID: 220e6cfd2a83e522874b8c060c47f9fafa3ba9ded99eb9cd5873e37f05b043aa
                                                              • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                                              • Instruction Fuzzy Hash: 1B11DD75904280DFCB16CF54C9C4B15FBB1FB84324F24C6ADD8494B696C33AD80AEB61
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159296127.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_eed000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1cbcfc9e80233109596cab265e70fdf063c093637b922b9b627ba9382e0aa78
                                                              • Instruction ID: 3c5d93191b9ac9bf098b112fa746fd6525691919d6e0ff79a1d24a205ce37656
                                                              • Opcode Fuzzy Hash: d1cbcfc9e80233109596cab265e70fdf063c093637b922b9b627ba9382e0aa78
                                                              • Instruction Fuzzy Hash: D0012B7100C3889AE7108F16CDC4BA6BF98DF41374F18D51BFD091A286D2399840C6B1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2159296127.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_eed000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c59ca9129d44ff765df43de58a6e51c5df5ed03f7167308d78b875ac1b7939be
                                                              • Instruction ID: 00233dcaf4a1c9e7764294820aef0cb154a2a3a83c174b7aed2bf0ae90ee818b
                                                              • Opcode Fuzzy Hash: c59ca9129d44ff765df43de58a6e51c5df5ed03f7167308d78b875ac1b7939be
                                                              • Instruction Fuzzy Hash: E6F062724093849AE7108F16CD88B62FF98EB91778F18C45AFD485A286C2799844CAB1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TJjq$Teeq$xbhq
                                                              • API String ID: 0-642506051
                                                              • Opcode ID: ccfee6cbc32371d094ed8382649fbb8c974dd12856991b6fba001ebca1aec795
                                                              • Instruction ID: 1510c5e3bacd4b8121243d3e7194b004585ab92255c5ebb782c08df0f4af7a25
                                                              • Opcode Fuzzy Hash: ccfee6cbc32371d094ed8382649fbb8c974dd12856991b6fba001ebca1aec795
                                                              • Instruction Fuzzy Hash: 5EB1A0B5E006588FDB59DF6AD9846DDBBF2AF89301F14C0AAD809AB354DB305E858F40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'eq
                                                              • API String ID: 0-1552367303
                                                              • Opcode ID: 045ce80f7a5c5345652640c0f7b7bf6f1c00411138c0d1877f57918d87a7311a
                                                              • Instruction ID: db05c62e718cde8c7a16c10daa1d8d1eb5d1ad1268abaae87650094a78d22ffe
                                                              • Opcode Fuzzy Hash: 045ce80f7a5c5345652640c0f7b7bf6f1c00411138c0d1877f57918d87a7311a
                                                              • Instruction Fuzzy Hash: E9613EB1A046498FD70AEF7AE94579E7FF2FF88300F14C529E015E72A9EB305A458B50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2173195983.0000000007430000.00000040.00000800.00020000.00000000.sdmp, Offset: 07430000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7430000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'eq
                                                              • API String ID: 0-1552367303
                                                              • Opcode ID: 9375495c5522435bd26fa0fb7e276d34ad6d9fdec97f82e584c82c435ad3f551
                                                              • Instruction ID: 5285037253a7d1f84c7bcef91da994f81452e091b7cf8382eace5107cf0fabd5
                                                              • Opcode Fuzzy Hash: 9375495c5522435bd26fa0fb7e276d34ad6d9fdec97f82e584c82c435ad3f551
                                                              • Instruction Fuzzy Hash: 63612FB0A046498FD70AEF7AE94569E7FF2FF88300F14C529E014E72A9EB301A458B50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7842723aa2a84b2b76a1092741af4239a914fd58b7d6425db7c9ca1228b3e0de
                                                              • Instruction ID: 434917121f19a86e862c9ec5940c2921bd7e8328b77df3bb91ff80a989cc563e
                                                              • Opcode Fuzzy Hash: 7842723aa2a84b2b76a1092741af4239a914fd58b7d6425db7c9ca1228b3e0de
                                                              • Instruction Fuzzy Hash: 1EE1F7B4E012198FCB14DFA9C580AAEFBB2FF89304F249169D514AB355D735AD81CFA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66643628ca09cc59bab340fde1127af2a0e673200f0781115ab6799214d8a4d3
                                                              • Instruction ID: 871810ed649acda9daa37b1c0961f13aca9499e1813a45dee39277f59f98debc
                                                              • Opcode Fuzzy Hash: 66643628ca09cc59bab340fde1127af2a0e673200f0781115ab6799214d8a4d3
                                                              • Instruction Fuzzy Hash: FDE1F6B4E011598FCB14DFA9C580AAEFBF2BF89304F249169D814AB355D735AE81CF60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a765a988fc091b5f44ea92e338060ced433bda16145fcc254e6c768c2226e7dd
                                                              • Instruction ID: a7fe07080c045c9eedd9b557d791e6db5d18c6318f945e24f6cc28ef787db2a5
                                                              • Opcode Fuzzy Hash: a765a988fc091b5f44ea92e338060ced433bda16145fcc254e6c768c2226e7dd
                                                              • Instruction Fuzzy Hash: 1BE118B4E011198FCB14DFA8C580AAEFBB6FF89304F249169D514AB356D735AE81CF60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fcdec5424a6e442647ac71cc6c87f93725c314f113c5ab1bd38eabca69f48933
                                                              • Instruction ID: 1f9ba9e8223faf8dfc57f3c5bf26c74b34bf7ca85c62b2de7011060bb50182d7
                                                              • Opcode Fuzzy Hash: fcdec5424a6e442647ac71cc6c87f93725c314f113c5ab1bd38eabca69f48933
                                                              • Instruction Fuzzy Hash: 91E117B4E051598FCB14DFA8C580AAEFBB2FF89304F249169D414AB359D735AE81CF60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc048af2970d5769028c56b727e5f356fb255d487fd369fcf638bf470fe0bc41
                                                              • Instruction ID: 5c405d03976e59d2f7360462d0e0365f9ef57ad12d57c5c735dd27ecfd6b2a4e
                                                              • Opcode Fuzzy Hash: bc048af2970d5769028c56b727e5f356fb255d487fd369fcf638bf470fe0bc41
                                                              • Instruction Fuzzy Hash: E1E1F6B4E012198FCB14DFA9C580AAEFBB2FF89305F249169D414AB355D735AE81CF60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2160097967.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_11d0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c09eaef1fe8421abdd1672cd433cee30de527a1f648c41c817ed83e8f0479e59
                                                              • Instruction ID: c9b84af30589eb7991228a24367d71f2050e67701ae811e3d2785feefd1a118b
                                                              • Opcode Fuzzy Hash: c09eaef1fe8421abdd1672cd433cee30de527a1f648c41c817ed83e8f0479e59
                                                              • Instruction Fuzzy Hash: FFA17132E006178FCF09DFB4D84059EBBB2FF85304B15856AE906AB265DB71EA57CB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fe638e67be54b8c0c69778b26222620de192b92a960c0dd970e3332ddc27b209
                                                              • Instruction ID: d47f54891ad6e967ca6106ed22d60a8b9c345bb44a149a815b5a11979a09565c
                                                              • Opcode Fuzzy Hash: fe638e67be54b8c0c69778b26222620de192b92a960c0dd970e3332ddc27b209
                                                              • Instruction Fuzzy Hash: E4511AB4E052198FCB14CFA9C5809AEFBF2FF89304F24916AD418AB355D7359A41CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7ea47e6125d5e5c94459cebdd5c3302a232bcefffc26e8c1395864c7f4458fb9
                                                              • Instruction ID: 4acf7e9e63cafef7dc7b4286a50f4be8145718ece0dbcfd2bb10c09e5ca29f25
                                                              • Opcode Fuzzy Hash: 7ea47e6125d5e5c94459cebdd5c3302a232bcefffc26e8c1395864c7f4458fb9
                                                              • Instruction Fuzzy Hash: EF5138B0E012198FCB14CFA9C5809AEBBF6BF89304F24D16AD518A7215D7349A41CFA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b742f9b824e09404388dfa968b1a74e370615f626289bdeb8ed7e2c2f378f9b
                                                              • Instruction ID: bbee9a17d1b9c4eba481f823722aca3758d3093e0297a568bc9e3c57ea6600d6
                                                              • Opcode Fuzzy Hash: 0b742f9b824e09404388dfa968b1a74e370615f626289bdeb8ed7e2c2f378f9b
                                                              • Instruction Fuzzy Hash: AA5129B4E052198FCB14DFA9C5805EEFBF2BF89304F24D16AD418AB215D7349A42CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176522885.0000000007E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7e70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 063c076390380b6bfc3853be11ca5d47e004227c732ed68e409bd134226cef51
                                                              • Instruction ID: 8b890d88b1c9b0fe2f0f7d70faee0b8aa2b895d17aba220a6cef52d5483acc84
                                                              • Opcode Fuzzy Hash: 063c076390380b6bfc3853be11ca5d47e004227c732ed68e409bd134226cef51
                                                              • Instruction Fuzzy Hash: A051F9B4E012198FCB14DFA9C5809AEFBF2BF89304F24D169D418A7255D7359E42CF60

                                                              Execution Graph

                                                              Execution Coverage:11.4%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:28
                                                              Total number of Limit Nodes:5
                                                              execution_graph 29044 2a70848 29046 2a7084e 29044->29046 29045 2a7091b 29046->29045 29049 2a71380 29046->29049 29054 2a71488 29046->29054 29051 2a71396 29049->29051 29050 2a71480 29050->29046 29051->29050 29053 2a71488 4 API calls 29051->29053 29062 2a77eb0 29051->29062 29053->29051 29055 2a71443 29054->29055 29058 2a71493 29054->29058 29057 2a71396 29055->29057 29060 2a71488 4 API calls 29055->29060 29056 2a71480 29056->29046 29057->29056 29059 2a71488 4 API calls 29057->29059 29061 2a77eb0 4 API calls 29057->29061 29058->29046 29059->29057 29060->29057 29061->29057 29063 2a77eba 29062->29063 29064 2a77ed4 29063->29064 29067 68efa0b 29063->29067 29072 68efa18 29063->29072 29064->29051 29069 68efa2d 29067->29069 29068 68efc42 29068->29064 29069->29068 29070 68efc58 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29069->29070 29071 68efc68 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29069->29071 29070->29069 29071->29069 29074 68efa2d 29072->29074 29073 68efc42 29073->29064 29074->29073 29075 68efc58 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29074->29075 29076 68efc68 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29074->29076 29075->29074 29076->29074
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-220072568
                                                              • Opcode ID: 46785e335cd894076cda9afbcd728d4f152b2b6b9e705b3f808dd04e3202141b
                                                              • Instruction ID: 254b1023cc48c9fc471b2b8f3c043fb077e486888b19a4f215c1c85184dbcba0
                                                              • Opcode Fuzzy Hash: 46785e335cd894076cda9afbcd728d4f152b2b6b9e705b3f808dd04e3202141b
                                                              • Instruction Fuzzy Hash: ECD25A34E00205CFDB64DF68C594A9DB7B6FF8A310F5485AAD509EB265EB34ED81CB80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1667 68e7d68-68e7d86 1668 68e7d88-68e7d8b 1667->1668 1669 68e7d8d-68e7d9b 1668->1669 1670 68e7da2-68e7da5 1668->1670 1678 68e7e0e-68e7e24 1669->1678 1679 68e7d9d 1669->1679 1671 68e7dc6-68e7dc9 1670->1671 1672 68e7da7-68e7dc1 1670->1672 1674 68e7dcb-68e7dd5 1671->1674 1675 68e7dd6-68e7dd9 1671->1675 1672->1671 1676 68e7dfc-68e7dfe 1675->1676 1677 68e7ddb-68e7df7 1675->1677 1681 68e7e05-68e7e08 1676->1681 1682 68e7e00 1676->1682 1677->1676 1686 68e803f-68e8049 1678->1686 1687 68e7e2a-68e7e33 1678->1687 1679->1670 1681->1668 1681->1678 1682->1681 1688 68e804a-68e807f 1687->1688 1689 68e7e39-68e7e56 1687->1689 1693 68e8081-68e8084 1688->1693 1697 68e802c-68e8039 1689->1697 1698 68e7e5c-68e7e84 1689->1698 1695 68e8086-68e80a2 1693->1695 1696 68e80a7-68e80aa 1693->1696 1695->1696 1699 68e82df-68e82e2 1696->1699 1700 68e80b0-68e80bf 1696->1700 1697->1686 1697->1687 1698->1697 1718 68e7e8a-68e7e93 1698->1718 1701 68e838d-68e838f 1699->1701 1702 68e82e8-68e82f4 1699->1702 1708 68e80de-68e8122 1700->1708 1709 68e80c1-68e80dc 1700->1709 1705 68e8396-68e8399 1701->1705 1706 68e8391 1701->1706 1711 68e82ff-68e8301 1702->1711 1705->1693 1710 68e839f-68e83a8 1705->1710 1706->1705 1724 68e8128-68e8139 1708->1724 1725 68e82b3-68e82c9 1708->1725 1709->1708 1714 68e8319-68e831d 1711->1714 1715 68e8303-68e8309 1711->1715 1721 68e831f-68e8329 1714->1721 1722 68e832b 1714->1722 1719 68e830d-68e830f 1715->1719 1720 68e830b 1715->1720 1718->1688 1726 68e7e99-68e7eb5 1718->1726 1719->1714 1720->1714 1723 68e8330-68e8332 1721->1723 1722->1723 1727 68e8334-68e8337 1723->1727 1728 68e8343-68e837c 1723->1728 1735 68e829e-68e82ad 1724->1735 1736 68e813f-68e815c 1724->1736 1725->1699 1737 68e801a-68e8026 1726->1737 1738 68e7ebb-68e7ee5 1726->1738 1727->1710 1728->1700 1749 68e8382-68e838c 1728->1749 1735->1724 1735->1725 1736->1735 1746 68e8162-68e8258 call 68e6590 1736->1746 1737->1697 1737->1718 1751 68e7eeb-68e7f13 1738->1751 1752 68e8010-68e8015 1738->1752 1800 68e825a-68e8264 1746->1800 1801 68e8266 1746->1801 1751->1752 1758 68e7f19-68e7f47 1751->1758 1752->1737 1758->1752 1763 68e7f4d-68e7f56 1758->1763 1763->1752 1765 68e7f5c-68e7f8e 1763->1765 1773 68e7f99-68e7fb5 1765->1773 1774 68e7f90-68e7f94 1765->1774 1773->1737 1776 68e7fb7-68e800e call 68e6590 1773->1776 1774->1752 1775 68e7f96 1774->1775 1775->1773 1776->1737 1802 68e826b-68e826d 1800->1802 1801->1802 1802->1735 1803 68e826f-68e8274 1802->1803 1804 68e8276-68e8280 1803->1804 1805 68e8282 1803->1805 1806 68e8287-68e8289 1804->1806 1805->1806 1806->1735 1807 68e828b-68e8297 1806->1807 1807->1735
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq
                                                              • API String ID: 0-2246304398
                                                              • Opcode ID: 368acacb268b6c2d6c58b08d2600279dfccb6f65bf69369f2b352d899f7da04c
                                                              • Instruction ID: 6bb856242977637354dbab354449a333a119565ab095d6efe6592fb69ef6f0af
                                                              • Opcode Fuzzy Hash: 368acacb268b6c2d6c58b08d2600279dfccb6f65bf69369f2b352d899f7da04c
                                                              • Instruction Fuzzy Hash: 7202AF70B006058FDB54DB68D994BAEB7B2FF85310F148969D905DB399EB35EC82CB80
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f27cdcc128c5991f7aca48afa2685c2680c10a67dcd6858a4ad6e413590fed7a
                                                              • Instruction ID: 7ea05c446c7afcf7c00e9a72a011482fb7a514d10106c969197ed8cb5968b3d5
                                                              • Opcode Fuzzy Hash: f27cdcc128c5991f7aca48afa2685c2680c10a67dcd6858a4ad6e413590fed7a
                                                              • Instruction Fuzzy Hash: 16627B34F002058FDB54EB68D584BADB7B2EF89314F148969E906DB395EB35EC81CB80
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e25520b1680357a481e46669b083753a4e80d985e46860acdd74738034fd1006
                                                              • Instruction ID: 1e1330edf7100e58cd4d6d192bf97786f8ec8453b6e89e83d97820e88a938406
                                                              • Opcode Fuzzy Hash: e25520b1680357a481e46669b083753a4e80d985e46860acdd74738034fd1006
                                                              • Instruction Fuzzy Hash: 6B22D235F042158FDF60DBA4C5806AEBBB2EF86324F248469D915EB354DB36EC41CB92
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 653efc23014439a69f54b095bde6ab9a41de0d4d68996b37621411d06161b243
                                                              • Instruction ID: b1f0056f8ae2b3d39bfceb711ee15bb33d30078275d89a1cb70bb30ed57d9cdc
                                                              • Opcode Fuzzy Hash: 653efc23014439a69f54b095bde6ab9a41de0d4d68996b37621411d06161b243
                                                              • Instruction Fuzzy Hash: CF226174E101098FDF64DBA8D6847AEB7F2EB86310F648426E609DB395DB34DC818B91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 68eacb8-68eacd6 1 68eacd8-68eacdb 0->1 2 68eacdd-68eace2 1->2 3 68eace5-68eace8 1->3 2->3 4 68eacea-68ead06 3->4 5 68ead0b-68ead0e 3->5 4->5 6 68ead1f-68ead22 5->6 7 68ead10-68ead14 5->7 11 68ead3c-68ead3f 6->11 12 68ead24-68ead37 6->12 9 68ead1a 7->9 10 68eaee4-68eaeee 7->10 9->6 13 68ead4f-68ead52 11->13 14 68ead41-68ead4a 11->14 12->11 15 68ead58-68ead5b 13->15 16 68eaed5-68eaede 13->16 14->13 19 68ead5d-68ead66 15->19 20 68ead75-68ead78 15->20 16->10 16->19 21 68eaeef-68eaf01 19->21 22 68ead6c-68ead70 19->22 23 68ead8c-68ead8e 20->23 24 68ead7a-68ead87 20->24 30 68eae8a 21->30 31 68eaf03-68eaf26 21->31 22->20 25 68ead95-68ead98 23->25 26 68ead90 23->26 24->23 25->1 28 68ead9e-68eadc2 25->28 26->25 46 68eadc8-68eadd7 28->46 47 68eaed2 28->47 34 68eae8e-68eae90 30->34 35 68eae8c 30->35 32 68eaf28-68eaf2b 31->32 36 68eb194-68eb197 32->36 37 68eaf31-68eaf6c 32->37 38 68eae9a-68eaecb 34->38 35->38 39 68eb199 call 68eb20f 36->39 40 68eb1a6-68eb1a9 36->40 48 68eb15f-68eb172 37->48 49 68eaf72-68eaf7e 37->49 38->47 53 68eb19f-68eb1a1 39->53 44 68eb1ba-68eb1bd 40->44 45 68eb1ab-68eb1af 40->45 51 68eb1bf-68eb1c9 44->51 52 68eb1ca-68eb1cd 44->52 45->37 50 68eb1b5 45->50 59 68eadef-68eae2a call 68e6590 46->59 60 68eadd9-68eaddf 46->60 47->16 58 68eb174 48->58 70 68eaf9e-68eafe2 49->70 71 68eaf80-68eaf99 49->71 50->44 54 68eb1cf-68eb1eb 52->54 55 68eb1f0-68eb1f2 52->55 53->40 54->55 61 68eb1f9-68eb1fc 55->61 62 68eb1f4 55->62 68 68eb175 58->68 86 68eae2c-68eae32 59->86 87 68eae42-68eae59 59->87 65 68eade3-68eade5 60->65 66 68eade1 60->66 61->32 69 68eb202-68eb20c 61->69 62->61 65->59 66->59 68->68 90 68eaffe-68eb03d 70->90 91 68eafe4-68eaff6 70->91 71->58 88 68eae36-68eae38 86->88 89 68eae34 86->89 99 68eae5b-68eae61 87->99 100 68eae71-68eae82 87->100 88->87 89->87 96 68eb124-68eb139 90->96 97 68eb043-68eb11e call 68e6590 90->97 91->90 96->48 97->96 102 68eae65-68eae67 99->102 103 68eae63 99->103 100->38 108 68eae84 100->108 102->100 103->100 108->30
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-1110479544
                                                              • Opcode ID: 8a7a20570ae5ba181a2dd4e747c484fbecdf239e1706fff36012762254730a96
                                                              • Instruction ID: a9a2a9714b60f4f130ccd9df3686cc7df166d70ff3cb29c78b04805c5d5b4891
                                                              • Opcode Fuzzy Hash: 8a7a20570ae5ba181a2dd4e747c484fbecdf239e1706fff36012762254730a96
                                                              • Instruction Fuzzy Hash: FFE17030F1020A8FCF69DBA9D5806AEB7B2EF86310F108529E505DB355EB35DC46CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 573 68eb630-68eb650 574 68eb652-68eb655 573->574 575 68eb66f-68eb672 574->575 576 68eb657-68eb65e 574->576 579 68eb674-68eb67d 575->579 580 68eb682-68eb685 575->580 577 68eb664-68eb66a 576->577 578 68eb9d3-68eba0e 576->578 577->575 588 68eba10-68eba13 578->588 579->580 581 68eb68c-68eb68f 580->581 582 68eb687-68eb689 580->582 583 68eb69c-68eb69f 581->583 584 68eb691-68eb697 581->584 582->581 586 68eb6a5-68eb6a8 583->586 587 68eb770-68eb771 583->587 584->583 590 68eb6aa-68eb6b3 586->590 591 68eb6c5-68eb6c8 586->591 589 68eb776-68eb779 587->589 592 68ebc7f-68ebc82 588->592 593 68eba19-68eba41 588->593 594 68eb7ce-68eb7d1 589->594 595 68eb77b-68eb7c9 call 68e6590 589->595 590->578 596 68eb6b9-68eb6c0 590->596 599 68eb6ca-68eb6d3 591->599 600 68eb6d8-68eb6db 591->600 597 68ebc84-68ebca0 592->597 598 68ebca5-68ebca7 592->598 639 68eba4b-68eba8f 593->639 640 68eba43-68eba46 593->640 603 68eb7d3-68eb7e8 594->603 604 68eb810-68eb813 594->604 595->594 596->591 597->598 601 68ebcae-68ebcb1 598->601 602 68ebca9 598->602 599->600 606 68eb6dd-68eb6e6 600->606 607 68eb6eb-68eb6ee 600->607 601->588 610 68ebcb7-68ebcc0 601->610 602->601 603->578 627 68eb7ee-68eb80b 603->627 612 68eb815-68eb82a 604->612 613 68eb852-68eb855 604->613 606->607 608 68eb708-68eb70b 607->608 609 68eb6f0-68eb6f6 607->609 618 68eb70d-68eb713 608->618 619 68eb71a-68eb71d 608->619 609->578 615 68eb6fc-68eb703 609->615 612->578 638 68eb830-68eb84d 612->638 616 68eb87f-68eb882 613->616 617 68eb857-68eb85e 613->617 615->608 628 68eb884-68eb8a0 616->628 629 68eb8a5-68eb8a8 616->629 617->578 623 68eb864-68eb874 617->623 618->609 624 68eb715 618->624 625 68eb72f-68eb732 619->625 626 68eb71f-68eb72a 619->626 657 68eb87a 623->657 658 68eb947-68eb94e 623->658 624->619 634 68eb749-68eb74c 625->634 635 68eb734-68eb73b 625->635 626->625 627->604 628->629 636 68eb8ca-68eb8cd 629->636 637 68eb8aa-68eb8c5 629->637 649 68eb74e-68eb753 634->649 650 68eb756-68eb759 634->650 635->578 648 68eb741-68eb744 635->648 641 68eb8cf-68eb8d2 636->641 642 68eb8d7-68eb8da 636->642 637->636 638->613 686 68ebc74-68ebc7e 639->686 687 68eba95-68eba9e 639->687 640->610 641->642 652 68eb92e-68eb937 642->652 653 68eb8dc-68eb8df 642->653 648->634 649->650 654 68eb75b-68eb761 650->654 655 68eb766-68eb769 650->655 652->590 659 68eb93d 652->659 663 68eb8f0-68eb8f3 653->663 664 68eb8e1-68eb8e5 653->664 654->655 655->618 660 68eb76b-68eb76e 655->660 657->616 658->578 661 68eb954-68eb964 658->661 671 68eb942-68eb945 659->671 660->587 660->589 661->587 679 68eb96a 661->679 669 68eb8f5-68eb8fe 663->669 670 68eb903-68eb906 663->670 664->606 668 68eb8eb 664->668 668->663 669->670 670->587 675 68eb90c-68eb90f 670->675 671->658 672 68eb96f-68eb972 671->672 680 68eb984-68eb987 672->680 681 68eb974 672->681 677 68eb929-68eb92c 675->677 678 68eb911-68eb918 675->678 677->652 677->671 678->578 685 68eb91e-68eb924 678->685 679->672 680->587 684 68eb98d-68eb990 680->684 688 68eb97c-68eb97f 681->688 689 68eb9b6-68eb9b8 684->689 690 68eb992-68eb999 684->690 685->677 694 68ebc6a-68ebc6f 687->694 695 68ebaa4-68ebb10 call 68e6590 687->695 688->680 692 68eb9bf-68eb9c2 689->692 693 68eb9ba 689->693 690->578 696 68eb99b-68eb9ab 690->696 692->574 697 68eb9c8-68eb9d2 692->697 693->692 694->686 707 68ebc0a-68ebc1f 695->707 708 68ebb16-68ebb1b 695->708 696->617 701 68eb9b1 696->701 701->689 707->694 710 68ebb1d-68ebb23 708->710 711 68ebb37 708->711 712 68ebb29-68ebb2b 710->712 713 68ebb25-68ebb27 710->713 714 68ebb39-68ebb3f 711->714 715 68ebb35 712->715 713->715 716 68ebb54-68ebb61 714->716 717 68ebb41-68ebb47 714->717 715->714 724 68ebb79-68ebb86 716->724 725 68ebb63-68ebb69 716->725 718 68ebb4d 717->718 719 68ebbf5-68ebc04 717->719 718->716 720 68ebbbc-68ebbc9 718->720 721 68ebb88-68ebb95 718->721 719->707 719->708 730 68ebbcb-68ebbd1 720->730 731 68ebbe1-68ebbee 720->731 733 68ebbad-68ebbba 721->733 734 68ebb97-68ebb9d 721->734 724->719 726 68ebb6d-68ebb6f 725->726 727 68ebb6b 725->727 726->724 727->724 735 68ebbd5-68ebbd7 730->735 736 68ebbd3 730->736 731->719 733->719 737 68ebb9f 734->737 738 68ebba1-68ebba3 734->738 735->731 736->731 737->733 738->733
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-220072568
                                                              • Opcode ID: d9cb7a8b2da1eae13b18e6541e7af8522e24021cf0b2a8a31389662120e06192
                                                              • Instruction ID: 9a31ffd91b3adecc41030029972d4dc2fca666f78b144224e66ce0eda158b06e
                                                              • Opcode Fuzzy Hash: d9cb7a8b2da1eae13b18e6541e7af8522e24021cf0b2a8a31389662120e06192
                                                              • Instruction Fuzzy Hash: 4D026E30E142098FDBA4DF68D6807AEB7B2EF86310F20856AE555DB355DB31EC81CB81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 741 68e9138-68e915d 742 68e915f-68e9162 741->742 743 68e9168-68e917d 742->743 744 68e9a20-68e9a23 742->744 752 68e917f-68e9185 743->752 753 68e9195-68e91ab 743->753 745 68e9a49-68e9a4b 744->745 746 68e9a25-68e9a44 744->746 747 68e9a4d 745->747 748 68e9a52-68e9a55 745->748 746->745 747->748 748->742 750 68e9a5b-68e9a65 748->750 754 68e9189-68e918b 752->754 755 68e9187 752->755 758 68e91b6-68e91b8 753->758 754->753 755->753 759 68e91ba-68e91c0 758->759 760 68e91d0-68e9241 758->760 761 68e91c4-68e91c6 759->761 762 68e91c2 759->762 771 68e926d-68e9289 760->771 772 68e9243-68e9266 760->772 761->760 762->760 777 68e928b-68e92ae 771->777 778 68e92b5-68e92d0 771->778 772->771 777->778 783 68e92fb-68e9316 778->783 784 68e92d2-68e92f4 778->784 789 68e933b-68e9349 783->789 790 68e9318-68e9334 783->790 784->783 791 68e934b-68e9354 789->791 792 68e9359-68e93d3 789->792 790->789 791->750 798 68e93d5-68e93f3 792->798 799 68e9420-68e9435 792->799 803 68e940f-68e941e 798->803 804 68e93f5-68e9404 798->804 799->744 803->798 803->799 804->803
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq
                                                              • API String ID: 0-812946093
                                                              • Opcode ID: 7a416221a13e0fab2d00f9d83c59752caeac2e401ce54697c9b372e56a990fe2
                                                              • Instruction ID: 325c0050e262a1b967bd3af8b7854f345971e808c135f3527a72d8ca59f2ecd4
                                                              • Opcode Fuzzy Hash: 7a416221a13e0fab2d00f9d83c59752caeac2e401ce54697c9b372e56a990fe2
                                                              • Instruction Fuzzy Hash: D4915070F0060A9FDF54DF74D9947AE77F6AF89300F118469D519EB398EA70AC418B90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 807 68ecf28-68ecf43 808 68ecf45-68ecf48 807->808 809 68ecf4a-68ecf8c 808->809 810 68ecf91-68ecf94 808->810 809->810 811 68ecf9a-68ecf9d 810->811 812 68ed414-68ed420 810->812 813 68ecf9f-68ecfae 811->813 814 68ecfe6-68ecfe9 811->814 815 68ed426-68ed713 812->815 816 68ed122-68ed131 812->816 822 68ecfbd-68ecfc9 813->822 823 68ecfb0-68ecfb5 813->823 818 68ecfeb-68ed02d 814->818 819 68ed032-68ed035 814->819 1020 68ed93a-68ed944 815->1020 1021 68ed719-68ed71f 815->1021 820 68ed133-68ed138 816->820 821 68ed140-68ed14c 816->821 818->819 828 68ed07e-68ed081 819->828 829 68ed037-68ed079 819->829 820->821 826 68ed945-68ed97e 821->826 827 68ed152-68ed164 821->827 822->826 830 68ecfcf-68ecfe1 822->830 823->822 843 68ed980-68ed983 826->843 844 68ed169-68ed16c 827->844 832 68ed0a4-68ed0a7 828->832 833 68ed083-68ed09f 828->833 829->828 830->814 834 68ed0a9-68ed0eb 832->834 835 68ed0f0-68ed0f3 832->835 833->832 834->835 845 68ed0fd-68ed100 835->845 846 68ed0f5-68ed0fa 835->846 852 68ed9a6-68ed9a9 843->852 853 68ed985-68ed9a1 843->853 854 68ed16e-68ed170 844->854 855 68ed17b-68ed17e 844->855 856 68ed11d-68ed120 845->856 857 68ed102-68ed118 845->857 846->845 862 68ed9ab 852->862 863 68ed9b8-68ed9bb 852->863 853->852 859 68ed176 854->859 860 68ed411 854->860 864 68ed1c7-68ed1ca 855->864 865 68ed180-68ed1c2 855->865 856->816 856->844 857->856 859->855 860->812 1067 68ed9ab call 68eda9d 862->1067 1068 68ed9ab call 68edab0 862->1068 870 68ed9ee-68ed9f0 863->870 871 68ed9bd-68ed9e9 863->871 874 68ed1cc-68ed20e 864->874 875 68ed213-68ed216 864->875 865->864 880 68ed9f7-68ed9fa 870->880 881 68ed9f2 870->881 871->870 874->875 876 68ed218-68ed21a 875->876 877 68ed225-68ed228 875->877 885 68ed2cf-68ed2d8 876->885 886 68ed220 876->886 887 68ed22a-68ed26c 877->887 888 68ed271-68ed274 877->888 878 68ed9b1-68ed9b3 878->863 880->843 891 68ed9fc-68eda0b 880->891 881->880 894 68ed2da-68ed2df 885->894 895 68ed2e7-68ed2f3 885->895 886->877 887->888 897 68ed2bd-68ed2bf 888->897 898 68ed276-68ed2b8 888->898 912 68eda0d-68eda70 call 68e6590 891->912 913 68eda72-68eda87 891->913 894->895 902 68ed2f9-68ed30d 895->902 903 68ed404-68ed409 895->903 900 68ed2c6-68ed2c9 897->900 901 68ed2c1 897->901 898->897 900->808 900->885 901->900 902->860 921 68ed313-68ed325 902->921 903->860 912->913 926 68eda88 913->926 936 68ed349-68ed34b 921->936 937 68ed327-68ed32d 921->937 926->926 940 68ed355-68ed361 936->940 941 68ed32f 937->941 942 68ed331-68ed33d 937->942 953 68ed36f 940->953 954 68ed363-68ed36d 940->954 945 68ed33f-68ed347 941->945 942->945 945->940 956 68ed374-68ed376 953->956 954->956 956->860 958 68ed37c-68ed398 call 68e6590 956->958 967 68ed39a-68ed39f 958->967 968 68ed3a7-68ed3b3 958->968 967->968 968->903 969 68ed3b5-68ed402 968->969 969->860 1022 68ed72e-68ed737 1021->1022 1023 68ed721-68ed726 1021->1023 1022->826 1024 68ed73d-68ed750 1022->1024 1023->1022 1026 68ed92a-68ed934 1024->1026 1027 68ed756-68ed75c 1024->1027 1026->1020 1026->1021 1028 68ed75e-68ed763 1027->1028 1029 68ed76b-68ed774 1027->1029 1028->1029 1029->826 1030 68ed77a-68ed79b 1029->1030 1033 68ed79d-68ed7a2 1030->1033 1034 68ed7aa-68ed7b3 1030->1034 1033->1034 1034->826 1035 68ed7b9-68ed7d6 1034->1035 1035->1026 1038 68ed7dc-68ed7e2 1035->1038 1038->826 1039 68ed7e8-68ed801 1038->1039 1041 68ed91d-68ed924 1039->1041 1042 68ed807-68ed82e 1039->1042 1041->1026 1041->1038 1042->826 1045 68ed834-68ed83e 1042->1045 1045->826 1046 68ed844-68ed85b 1045->1046 1048 68ed85d-68ed868 1046->1048 1049 68ed86a-68ed885 1046->1049 1048->1049 1049->1041 1054 68ed88b-68ed8a4 call 68e6590 1049->1054 1058 68ed8a6-68ed8ab 1054->1058 1059 68ed8b3-68ed8bc 1054->1059 1058->1059 1059->826 1060 68ed8c2-68ed916 1059->1060 1060->1041 1067->878 1068->878
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq
                                                              • API String ID: 0-177832560
                                                              • Opcode ID: b75b8116e3cb8ad71c30133834ff03b5fe010f73ffac7f073336e03935553341
                                                              • Instruction ID: 776da14dabafbdf49942e1eb556f5e8967ae3acb2a9f97a5139d90483dd0a84b
                                                              • Opcode Fuzzy Hash: b75b8116e3cb8ad71c30133834ff03b5fe010f73ffac7f073336e03935553341
                                                              • Instruction Fuzzy Hash: 53624030A006068FCB55EF68D990A5EB7F2FF85314B608A69D415DF369DB71EC86CB80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1069 68e4b50-68e4b74 1070 68e4b76-68e4b79 1069->1070 1071 68e4b7f-68e4c77 1070->1071 1072 68e5258-68e525b 1070->1072 1092 68e4c7d-68e4cc5 1071->1092 1093 68e4cfa-68e4d01 1071->1093 1073 68e527c-68e527e 1072->1073 1074 68e525d-68e5277 1072->1074 1076 68e5285-68e5288 1073->1076 1077 68e5280 1073->1077 1074->1073 1076->1070 1079 68e528e-68e529b 1076->1079 1077->1076 1115 68e4cca call 68e5408 1092->1115 1116 68e4cca call 68e53f8 1092->1116 1094 68e4d07-68e4d77 1093->1094 1095 68e4d85-68e4d8e 1093->1095 1112 68e4d79 1094->1112 1113 68e4d82 1094->1113 1095->1079 1106 68e4cd0-68e4cec 1109 68e4cee 1106->1109 1110 68e4cf7-68e4cf8 1106->1110 1109->1110 1110->1093 1112->1113 1113->1095 1115->1106 1116->1106
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: fjq$XPjq$\Ojq
                                                              • API String ID: 0-216941231
                                                              • Opcode ID: e880db659dce0cc4780f4c9464b15d8fc46196c6b2ccf1759b561e063b17ae48
                                                              • Instruction ID: 605ec7f4838e51cba470581afa9542ade6d4f8b246aec7fd3f607962006bf9e8
                                                              • Opcode Fuzzy Hash: e880db659dce0cc4780f4c9464b15d8fc46196c6b2ccf1759b561e063b17ae48
                                                              • Instruction Fuzzy Hash: 42615074F002189FEB549FA9C8547AEBAF6FF88310F20842AE505EB394DF759C458B91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1117 2a7eb48-2a7eb53 1118 2a7eb55-2a7eb7c 1117->1118 1119 2a7eb7d-2a7eb80 1117->1119 1120 2a7eb81-2a7eb93 1119->1120 1141 2a7eb95 call 2a7ebd8 1120->1141 1142 2a7eb95 call 2a7eb38 1120->1142 1143 2a7eb95 call 2a7eb48 1120->1143 1144 2a7eb95 call 2a7ec18 1120->1144 1123 2a7eb9a 1124 2a7eb9b-2a7eb9c 1123->1124 1125 2a7eba2-2a7ebec 1124->1125 1126 2a7eb9e-2a7eba1 1124->1126 1125->1124 1131 2a7ebee-2a7ebf4 1125->1131 1131->1120 1132 2a7ebf6-2a7ec01 1131->1132 1133 2a7ec07-2a7ec94 GlobalMemoryStatusEx 1132->1133 1134 2a7ec03-2a7ec06 1132->1134 1137 2a7ec96-2a7ec9c 1133->1137 1138 2a7ec9d-2a7ecc5 1133->1138 1137->1138 1141->1123 1142->1123 1143->1123 1144->1123
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3356984869.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_2a70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: _
                                                              • API String ID: 0-701932520
                                                              • Opcode ID: 8b48e336ad2f55fd834f0395d11299a0d33269519af77e4896c658b1bd552fd5
                                                              • Instruction ID: 7fbc95786f94675ff0f42c6cf96cc27566d9563ee0877a26dd33e108b53a41a7
                                                              • Opcode Fuzzy Hash: 8b48e336ad2f55fd834f0395d11299a0d33269519af77e4896c658b1bd552fd5
                                                              • Instruction Fuzzy Hash: 93415672E043998FCB11DF79D8446AEBFF4AF89220F1485AAD544E7241DB349988CBD1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2041 68e9127-68e915d 2042 68e915f-68e9162 2041->2042 2043 68e9168-68e917d 2042->2043 2044 68e9a20-68e9a23 2042->2044 2052 68e917f-68e9185 2043->2052 2053 68e9195-68e91ab 2043->2053 2045 68e9a49-68e9a4b 2044->2045 2046 68e9a25-68e9a44 2044->2046 2047 68e9a4d 2045->2047 2048 68e9a52-68e9a55 2045->2048 2046->2045 2047->2048 2048->2042 2050 68e9a5b-68e9a65 2048->2050 2054 68e9189-68e918b 2052->2054 2055 68e9187 2052->2055 2058 68e91b6-68e91b8 2053->2058 2054->2053 2055->2053 2059 68e91ba-68e91c0 2058->2059 2060 68e91d0-68e9241 2058->2060 2061 68e91c4-68e91c6 2059->2061 2062 68e91c2 2059->2062 2071 68e926d-68e9289 2060->2071 2072 68e9243-68e9266 2060->2072 2061->2060 2062->2060 2077 68e928b-68e92ae 2071->2077 2078 68e92b5-68e92d0 2071->2078 2072->2071 2077->2078 2083 68e92fb-68e9316 2078->2083 2084 68e92d2-68e92f4 2078->2084 2089 68e933b-68e9349 2083->2089 2090 68e9318-68e9334 2083->2090 2084->2083 2091 68e934b-68e9354 2089->2091 2092 68e9359-68e93d3 2089->2092 2090->2089 2091->2050 2098 68e93d5-68e93f3 2092->2098 2099 68e9420-68e9435 2092->2099 2103 68e940f-68e941e 2098->2103 2104 68e93f5-68e9404 2098->2104 2099->2044 2103->2098 2103->2099 2104->2103
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq
                                                              • API String ID: 0-2246304398
                                                              • Opcode ID: dd69e32381efbadb0b4284b7a4403ef90d5833e7af66435a0ce590b3024cf2ba
                                                              • Instruction ID: 15f7a7282803b05e5dfb8c7269e41c099aa63ed3eeec22085de0e7e5ebce52f1
                                                              • Opcode Fuzzy Hash: dd69e32381efbadb0b4284b7a4403ef90d5833e7af66435a0ce590b3024cf2ba
                                                              • Instruction Fuzzy Hash: 1F515170F006059FDF54EB74E994B6E73F6AF89300F118469C519EB398EA70EC418B90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2107 2a7ec18-2a7ec94 GlobalMemoryStatusEx 2109 2a7ec96-2a7ec9c 2107->2109 2110 2a7ec9d-2a7ecc5 2107->2110 2109->2110
                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 02A7EC87
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3356984869.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_2a70000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID:
                                                              • API String ID: 1890195054-0
                                                              • Opcode ID: b53e50a85cc38bec0b245b6ef610d5f8e3b2d2c4a5f2ff65293a2966f961ac1d
                                                              • Instruction ID: 67bca87930f531c914456f496d49b48bb35482acb663da75e5e7da7947ee5bc7
                                                              • Opcode Fuzzy Hash: b53e50a85cc38bec0b245b6ef610d5f8e3b2d2c4a5f2ff65293a2966f961ac1d
                                                              • Instruction Fuzzy Hash: 351106B5D0025A9FCB10CFAAC544BDEFBF4BF48320F14816AD418A7241D7796944CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2173 68e4b40-68e4b74 2174 68e4b76-68e4b79 2173->2174 2175 68e4b7f-68e4c77 2174->2175 2176 68e5258-68e525b 2174->2176 2196 68e4c7d-68e4cc5 2175->2196 2197 68e4cfa-68e4d01 2175->2197 2177 68e527c-68e527e 2176->2177 2178 68e525d-68e5277 2176->2178 2180 68e5285-68e5288 2177->2180 2181 68e5280 2177->2181 2178->2177 2180->2174 2183 68e528e-68e529b 2180->2183 2181->2180 2219 68e4cca call 68e5408 2196->2219 2220 68e4cca call 68e53f8 2196->2220 2198 68e4d07-68e4d77 2197->2198 2199 68e4d85-68e4d8e 2197->2199 2216 68e4d79 2198->2216 2217 68e4d82 2198->2217 2199->2183 2210 68e4cd0-68e4cec 2213 68e4cee 2210->2213 2214 68e4cf7-68e4cf8 2210->2214 2213->2214 2214->2197 2216->2217 2217->2199 2219->2210 2220->2210
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: XPjq
                                                              • API String ID: 0-4216394854
                                                              • Opcode ID: b542b4a1d7e1631b9a7a382177ed6c4e352bfde581b1660afd1e161a6984a90f
                                                              • Instruction ID: 80428fba6854db5dc2883cba03f9f189d97077031ed67f11465000f3f5ca9a80
                                                              • Opcode Fuzzy Hash: b542b4a1d7e1631b9a7a382177ed6c4e352bfde581b1660afd1e161a6984a90f
                                                              • Instruction Fuzzy Hash: D9414D74F002099FDB55DFA9C854BAEBAF6EF88300F20852AE505EB395DE759C058B90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2221 68edab0-68edac7 2222 68edac9-68edacc 2221->2222 2223 68edace-68edaea 2222->2223 2224 68edaef-68edaf2 2222->2224 2223->2224 2225 68edaf4-68edb20 2224->2225 2226 68edb25-68edb28 2224->2226 2225->2226 2227 68edb2a 2226->2227 2228 68edb37-68edb39 2226->2228 2232 68edb30-68edb32 2227->2232 2230 68edb3b 2228->2230 2231 68edb40-68edb43 2228->2231 2230->2231 2231->2222 2233 68edb45-68edb54 2231->2233 2232->2228 2236 68edb5a-68edb93 2233->2236 2237 68edcd9-68edd03 2233->2237 2244 68edb95-68edb9f 2236->2244 2245 68edbe1-68edc05 2236->2245 2240 68edd04 2237->2240 2240->2240 2249 68edbb7-68edbdf 2244->2249 2250 68edba1-68edba7 2244->2250 2251 68edc0f-68edcd3 2245->2251 2252 68edc07 2245->2252 2249->2244 2249->2245 2253 68edbab-68edbad 2250->2253 2254 68edba9 2250->2254 2251->2236 2251->2237 2252->2251 2253->2249 2254->2249
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHeq
                                                              • API String ID: 0-2873676430
                                                              • Opcode ID: b0d2b4e56e78b29596823d6357fa4d678d372a89007be8a5bb033070bf90d74c
                                                              • Instruction ID: 5a0a630cb9ffb6465ae0ed22532dc045e8931184534b84df4817dda087f6b8ee
                                                              • Opcode Fuzzy Hash: b0d2b4e56e78b29596823d6357fa4d678d372a89007be8a5bb033070bf90d74c
                                                              • Instruction Fuzzy Hash: 31419170E042099FDB61DF65C5446AFBBB2FF86340F204829D906EB340EB71D849CB80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2260 68eda9d-68edac7 2261 68edac9-68edacc 2260->2261 2262 68edace-68edaea 2261->2262 2263 68edaef-68edaf2 2261->2263 2262->2263 2264 68edaf4-68edb20 2263->2264 2265 68edb25-68edb28 2263->2265 2264->2265 2266 68edb2a 2265->2266 2267 68edb37-68edb39 2265->2267 2271 68edb30-68edb32 2266->2271 2269 68edb3b 2267->2269 2270 68edb40-68edb43 2267->2270 2269->2270 2270->2261 2272 68edb45-68edb54 2270->2272 2271->2267 2275 68edb5a-68edb93 2272->2275 2276 68edcd9-68edd03 2272->2276 2283 68edb95-68edb9f 2275->2283 2284 68edbe1-68edc05 2275->2284 2279 68edd04 2276->2279 2279->2279 2288 68edbb7-68edbdf 2283->2288 2289 68edba1-68edba7 2283->2289 2290 68edc0f-68edcd3 2284->2290 2291 68edc07 2284->2291 2288->2283 2288->2284 2292 68edbab-68edbad 2289->2292 2293 68edba9 2289->2293 2290->2275 2290->2276 2291->2290 2292->2288 2293->2288
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHeq
                                                              • API String ID: 0-2873676430
                                                              • Opcode ID: bda0fb638c3c461ee3a942d585d25cc97b24b0e7ebf4d7bc50352b960e7a85ba
                                                              • Instruction ID: dad2f1754b87fe558d9c4537522211500cb3868fbd6dbc692b833c5e38a9761e
                                                              • Opcode Fuzzy Hash: bda0fb638c3c461ee3a942d585d25cc97b24b0e7ebf4d7bc50352b960e7a85ba
                                                              • Instruction Fuzzy Hash: F1416E70E046099FDB55DF64C5846AEBBB2FF86340F10492AE906EB340EB71D84ACB81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHeq
                                                              • API String ID: 0-2873676430
                                                              • Opcode ID: 2c42be8f56da590a52c9c2f2c5ba084df96cd7ea490e30828396a21a715f1050
                                                              • Instruction ID: 05b4d0ca92a40f38ce42aaa89d712d22a113bfacf25dfa927cfdae22872dc661
                                                              • Opcode Fuzzy Hash: 2c42be8f56da590a52c9c2f2c5ba084df96cd7ea490e30828396a21a715f1050
                                                              • Instruction Fuzzy Hash: 2231ED30F002058FDB56AF74966476F7BA7AF8A300F244869C406DB395EE35CE42CBA4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHeq
                                                              • API String ID: 0-2873676430
                                                              • Opcode ID: ff47c16a9fad8d08acb69b2d6150d20a95279fd1639685e24759e50b520ec709
                                                              • Instruction ID: 2840ff48c2db9df25c5faecee8e667a0799b3fbd3a5a772d7fbb7a1b2e2e942a
                                                              • Opcode Fuzzy Hash: ff47c16a9fad8d08acb69b2d6150d20a95279fd1639685e24759e50b520ec709
                                                              • Instruction Fuzzy Hash: 1531BE30F102058FDB55AB78D56476F7BA7AF8A300F204868D506DB395EE35DD41CB94
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq
                                                              • API String ID: 0-731066626
                                                              • Opcode ID: 7a400fe3fcfc810dbcc0ca56bffd396fa2f479deaaf3a15c0bdec80ec91658ea
                                                              • Instruction ID: da156bd228508f30e00efb17cc9f72f6ee9774cde0e8a8064bf13355daf67a19
                                                              • Opcode Fuzzy Hash: 7a400fe3fcfc810dbcc0ca56bffd396fa2f479deaaf3a15c0bdec80ec91658ea
                                                              • Instruction Fuzzy Hash: E8F0EDBAF04205CFEFA49E86E9812ACB3A9AB02215F040066CF00C3198D330CA10C691
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b40ff9615a6e3213e877ffcaf13bf57d62672f9fbd98399cb17045c395e95df7
                                                              • Instruction ID: 2686fb0dd236faa3f3438796504adfdda315b06fc87b385a13996c366dc39ee9
                                                              • Opcode Fuzzy Hash: b40ff9615a6e3213e877ffcaf13bf57d62672f9fbd98399cb17045c395e95df7
                                                              • Instruction Fuzzy Hash: 22328034F102099FDF54DB68E984BAEB7B2FB8A310F10852AE916D7355DB35EC418B90
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2929fba97b8b024c44517f53ededae9e5cdbadb8366117e1cf65a22d65e66472
                                                              • Instruction ID: 72b47d77cea9435ef2163bc32e49e64c0e6c232f7097631c8f93274cd39660e8
                                                              • Opcode Fuzzy Hash: 2929fba97b8b024c44517f53ededae9e5cdbadb8366117e1cf65a22d65e66472
                                                              • Instruction Fuzzy Hash: 6061C071F004114FCF519A6EC88066FBADBAFE5220B254439D90EDB364EE69EC4287C1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4df0b6cacddf84470153c14603378b9dce2a82c57334c00579fba6b4dbe20ecf
                                                              • Instruction ID: 6aeb750a32152e120b56ea81581133f297416240dc4199867bf4f65c87afa7f0
                                                              • Opcode Fuzzy Hash: 4df0b6cacddf84470153c14603378b9dce2a82c57334c00579fba6b4dbe20ecf
                                                              • Instruction Fuzzy Hash: 61814B34F106098FDB54DBA8D5547AEB7F6AF89304F118429D50ADB398EE75EC428B80
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e447f46566356c39ef453508337cd9bf96241929be1734598a48f282e9144574
                                                              • Instruction ID: 6fd2e7ecaacbe8c1bce713c91b73712a34721c1292eddee69f0a739f1db00a3d
                                                              • Opcode Fuzzy Hash: e447f46566356c39ef453508337cd9bf96241929be1734598a48f282e9144574
                                                              • Instruction Fuzzy Hash: D3913D74E006198BDF60DF68C880B9DB7B1FF8A310F208599D54DEB295DB70AA85CF90
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f58fcd9e63e377ab4311721568e086c24be6ae6619cbf52c18a6a02cd5c92a40
                                                              • Instruction ID: 9f7a17d3707f43a07fe400dce98d2162e6e1741391daf615e633a7eefd220080
                                                              • Opcode Fuzzy Hash: f58fcd9e63e377ab4311721568e086c24be6ae6619cbf52c18a6a02cd5c92a40
                                                              • Instruction Fuzzy Hash: 43815B34F106098FDB54DFA8D5547AEB7F6AF89300F108429D50ADB398EE75EC428B81
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0eec1255d6a03f4e9e923cf63f22bb9fca71f4e1222766d97cc58353cb0eb053
                                                              • Instruction ID: 8b298af0f814379f79319abcf04b83a822f64221d85b49c2c8f857abc0de42b4
                                                              • Opcode Fuzzy Hash: 0eec1255d6a03f4e9e923cf63f22bb9fca71f4e1222766d97cc58353cb0eb053
                                                              • Instruction Fuzzy Hash: 7F911C74E106198BDF60DF68C880B9DB7B1FF89310F208699D54DEB295DB70AA85CF90
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a42e03bed647c1f09a5e857d49e80fc9ccad4d1ec9a1e38a41732bbb1d0ea59e
                                                              • Instruction ID: c2cc00abdde8ac29afb1354eed819b9d465b96db3bcdab7736e77674d442cc47
                                                              • Opcode Fuzzy Hash: a42e03bed647c1f09a5e857d49e80fc9ccad4d1ec9a1e38a41732bbb1d0ea59e
                                                              • Instruction Fuzzy Hash: 10715A70A002499FCB55DFA8D980AAEBBF6FF89300F248469E515EB355DB30ED46CB40
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2ac821912f40298bcdd45989b05f9e39cc9b4d799dd90d57c73cdf35e0d51ed9
                                                              • Instruction ID: 078e650118b214532468a74e19261f32765b0cdbb08bdd0473e78ff749d3db06
                                                              • Opcode Fuzzy Hash: 2ac821912f40298bcdd45989b05f9e39cc9b4d799dd90d57c73cdf35e0d51ed9
                                                              • Instruction Fuzzy Hash: B9714B70A002489FCB55DFA8D980AAEBBF6FF89300F148469E515EB355DB70EC45CB40
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7570df638ef129dfeac7d385b9ec765dafe7dee000a9d3d8e2102c9ce5992a0a
                                                              • Instruction ID: 97d76d55fffa462ef62701d8b53df55fb685606313376df27a471daf8cc37085
                                                              • Opcode Fuzzy Hash: 7570df638ef129dfeac7d385b9ec765dafe7dee000a9d3d8e2102c9ce5992a0a
                                                              • Instruction Fuzzy Hash: 2751DF31F00109DFCB54ABB8E5446AEBBB2FB8A311F208869E606DB250DB359D55CB80
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 134c44005a0cc259c5f263abf3f13212bd2e75347d551bc7cc2788a24c5da80a
                                                              • Instruction ID: a843f15e70baba3648433d2dbede166002b84f3a66625bcfdee95a8b5184636e
                                                              • Opcode Fuzzy Hash: 134c44005a0cc259c5f263abf3f13212bd2e75347d551bc7cc2788a24c5da80a
                                                              • Instruction Fuzzy Hash: 1351E974F602148FEFA16A6CD85472F366AD7CA350F20442AE70AD73D9CB78CC418792
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 68ae5507b82fa9cb85edba32bc3b8c52b5ce0e4fb3e3db8cde80c97aad716557
                                                              • Instruction ID: d0f061e9329e432c56992b434769773112e080568c5d6730104978d107f1e2c6
                                                              • Opcode Fuzzy Hash: 68ae5507b82fa9cb85edba32bc3b8c52b5ce0e4fb3e3db8cde80c97aad716557
                                                              • Instruction Fuzzy Hash: 8651E674F605148BEFA1666CD854B2F366AE7CA710F60442AE70AD73D9CF78CC8147A2
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b9b1915cd7eb1055e3cf6817622757819706bde56bf7669082dee7f09b3df053
                                                              • Instruction ID: 6d19674d532d3300c93051339d69e8fef2eec7aa838f21b123854d3aa99ff7a7
                                                              • Opcode Fuzzy Hash: b9b1915cd7eb1055e3cf6817622757819706bde56bf7669082dee7f09b3df053
                                                              • Instruction Fuzzy Hash: 19415171E006098BDF70CE99D880AAFF7F6FB85318F10492AD215D7650D731E9558B92
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3cf22cec0cbe680ad217b4da761fe9f29ddc01e0fe270c1a064ed768d7071e1
                                                              • Instruction ID: 870b1a1c7627dae6f83a59abbe885906b6147a4cdbbf9f9f8fc233ef38ed520f
                                                              • Opcode Fuzzy Hash: e3cf22cec0cbe680ad217b4da761fe9f29ddc01e0fe270c1a064ed768d7071e1
                                                              • Instruction Fuzzy Hash: 4131E131F005159FCB14ABB8E5142AEBBB2EB85301F108C69E606DB251DF359865C790
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f2960a015a5c87f7df94bfb42ebfa2559865c504c8a97468e1dd1c03e64ce781
                                                              • Instruction ID: cba046cde6b84ce6f34dac291a06d7e9fb1d10fc3f0e9bcb85ac1d6ccd7da94e
                                                              • Opcode Fuzzy Hash: f2960a015a5c87f7df94bfb42ebfa2559865c504c8a97468e1dd1c03e64ce781
                                                              • Instruction Fuzzy Hash: 0531A670E1460A8FCF55DF68D99069EBBF2FF85300F104929E505EB245EB71A946CB80
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8ad3b05909260fc85a38b08d0b34abeb5804cb5a41d32014c9b7b060d872337
                                                              • Instruction ID: 38534ff028007b34a400d9eef716c3ea6f6662ae4da93a15d83216ec341f39c4
                                                              • Opcode Fuzzy Hash: d8ad3b05909260fc85a38b08d0b34abeb5804cb5a41d32014c9b7b060d872337
                                                              • Instruction Fuzzy Hash: 28318F34E142069BCB59DFA4D8A46AEB7B6FF8A310F108529E906E7354DB71ED42CB40
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: abfc0c863c1e3cef3836f485ec65ca298449fe3ce321ea5c7355d089614ac764
                                                              • Instruction ID: 74513680ff32774d6ee03029d807c5d23509445e6281d20cb34e22e4531cc248
                                                              • Opcode Fuzzy Hash: abfc0c863c1e3cef3836f485ec65ca298449fe3ce321ea5c7355d089614ac764
                                                              • Instruction Fuzzy Hash: 2631B034E1020A9BCB18DFA4D8A469EB7B6FF8A300F108429E906E7350DB71FD41CB40
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b35be554c54202d0b80d3d85609c60cdcfb0741a73f414dca1aef59dfebf4e3b
                                                              • Instruction ID: 68f92a07393b4583e0ca8d219cc569b3974af0270d5d696064ca20fd0a35b611
                                                              • Opcode Fuzzy Hash: b35be554c54202d0b80d3d85609c60cdcfb0741a73f414dca1aef59dfebf4e3b
                                                              • Instruction Fuzzy Hash: 62218E76F006199FDB40DFA9D980BAEBBF5EB89710F148026EA05E7394E730DD418B94
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7f91cf566f02e64732febd6454cfff4b3d75cd866480b98c7529b21133320e1e
                                                              • Instruction ID: 271447665d85429952ff3b4e6db5faa8f69eb7a527bfa1111bcc0bc7ebaeeb52
                                                              • Opcode Fuzzy Hash: 7f91cf566f02e64732febd6454cfff4b3d75cd866480b98c7529b21133320e1e
                                                              • Instruction Fuzzy Hash: 71218C75F006199FDB40DFA9D980BAEB7F5EB88710F14802AEA05E7394E770DD408B94
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3356452996.00000000029AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_29ad000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fea701f0f060635e40da0ee9ce89a84d22f27c4cf6606ced293e838fb846ff84
                                                              • Instruction ID: d551dd7477dec5481bb42f6bf76bbcaec86d2921bcc8e197f446d26819cfa6b9
                                                              • Opcode Fuzzy Hash: fea701f0f060635e40da0ee9ce89a84d22f27c4cf6606ced293e838fb846ff84
                                                              • Instruction Fuzzy Hash: 352191755093C08FC703CB24C9A4711BF75EB46214F28C1DBD8888B6A3C33A980ACBA2
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3356452996.00000000029AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_29ad000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 28bdce6c83c0afc691b784774605ffe9c05a741c496f22207d1e22f7d2ea664c
                                                              • Instruction ID: d9e5d669f9d4dab0be0d9ec209880cea55e07103d0ebefc6c76931434e0a4091
                                                              • Opcode Fuzzy Hash: 28bdce6c83c0afc691b784774605ffe9c05a741c496f22207d1e22f7d2ea664c
                                                              • Instruction Fuzzy Hash: 242134B1508300DFDB15DF14D9D0B26BBA5FB88314F24C96DD80A0B686C33AD847CAB2
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c3f572cf5d0fb8a647d292c3502af490a33e5556331e8f2700d2971e56a1479d
                                                              • Instruction ID: 74653cc0b346f68a9910826d6370ea0e94e1c6f4ef9bfaf49179d6abbed04019
                                                              • Opcode Fuzzy Hash: c3f572cf5d0fb8a647d292c3502af490a33e5556331e8f2700d2971e56a1479d
                                                              • Instruction Fuzzy Hash: AA218E71A00B099BCB20CFA9CCC1AAFFBB6FF85304F108929E215D7651D731E8558B91
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4f59f2728379f7f4d73f9f65493784877290a8b2f9584253b594676af5597496
                                                              • Instruction ID: 5035fd52e88407693a463c4936cc351866a07de71da0922b7d5522e09765be26
                                                              • Opcode Fuzzy Hash: 4f59f2728379f7f4d73f9f65493784877290a8b2f9584253b594676af5597496
                                                              • Instruction Fuzzy Hash: D921A534F101189FCF54DBA9E55479DB7B7EB85310F648425D505D7354EB32AC818B84
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3e2f81889b1d79103e903185b098e53368077699174961e11bb049591dec209
                                                              • Instruction ID: e68de0c517e05eac521747483750c787f30d24a02cbec83b492c2c0d1b72f340
                                                              • Opcode Fuzzy Hash: e3e2f81889b1d79103e903185b098e53368077699174961e11bb049591dec209
                                                              • Instruction Fuzzy Hash: 0511A131F145299FDF549668D8186AE73BAABC9310F01443AD506E7398EE74DC028BD4
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67aa32d035f3fffd8904543259d795df152d5258f3f0d573861baac2382e5512
                                                              • Instruction ID: d76e4064707beee3a13c270c3338fe94a07140838f351f5ec35dbbc92ef0c8ec
                                                              • Opcode Fuzzy Hash: 67aa32d035f3fffd8904543259d795df152d5258f3f0d573861baac2382e5512
                                                              • Instruction Fuzzy Hash: B301DB30B041105FDBA296BDE44472FB6DADBCA720F20843AE60ECB394ED65EC424399
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0deb3d5d6a85f1cf4634fb5f7f0017be30fefac1736204ea690f2181d21b5cbc
                                                              • Instruction ID: 77dddcda320ef68ae749f6bbbcc0963e7bf9a11f57d1ecc1715381aeb2b8a83e
                                                              • Opcode Fuzzy Hash: 0deb3d5d6a85f1cf4634fb5f7f0017be30fefac1736204ea690f2181d21b5cbc
                                                              • Instruction Fuzzy Hash: B6018471B144145FCBA6D6BCD89076E67D6EBCA720F208829E70AC7341DE25DC134785
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f3b24555b619908f602150bf73b05cc2414a947b397568e14bc0c1c5e2183d75
                                                              • Instruction ID: 7ebbdc0112b8e4a8b3e1a374656df4790506730acb61f867f08d7c49b1e497e3
                                                              • Opcode Fuzzy Hash: f3b24555b619908f602150bf73b05cc2414a947b397568e14bc0c1c5e2183d75
                                                              • Instruction Fuzzy Hash: 71016D71E002289BCB98DBB9D9405DEF7B5EF8A310F10856AD606E7304EA31DE44CB91
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8ae11950cb99dd46df9bbc0c1b4fe647ac3a7c8c2c911a64e67dd9492eb8aa1a
                                                              • Instruction ID: 3678811a5d80bf92dbb01c09f9444a187dd125558d543f0b6225973ca89dc197
                                                              • Opcode Fuzzy Hash: 8ae11950cb99dd46df9bbc0c1b4fe647ac3a7c8c2c911a64e67dd9492eb8aa1a
                                                              • Instruction Fuzzy Hash: 2111D0B5D00219AFCB10CF9AD984ADEFFB8FB49310F50812AE918A7201C375A944CFA5
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 40c38199139e1b7f41c043394ac80849ff608239f93261a20abda4aba2611dcd
                                                              • Instruction ID: 6619101fef41006f9856df4a0e79bafdb1d869dcbfd61cb79e96239e42c35188
                                                              • Opcode Fuzzy Hash: 40c38199139e1b7f41c043394ac80849ff608239f93261a20abda4aba2611dcd
                                                              • Instruction Fuzzy Hash: F0014F70B045105FDBA5DABCE46472EB3D9EB86B14F11882AE70ACB794DE25DC0287C1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f29e1da29888e79855d216825d775dec13071dc5c7d42f62af7309b6c497277f
                                                              • Instruction ID: e253a51e9dd8bb055f1cbc97971d8efa82ca04cf855fa1db418dad29c536d737
                                                              • Opcode Fuzzy Hash: f29e1da29888e79855d216825d775dec13071dc5c7d42f62af7309b6c497277f
                                                              • Instruction Fuzzy Hash: AD21CFB5D01219AFCB00CF9AD985ADEFBB8FF49310F50812AE518B7201C375AA54CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07d76f340115ed574232e954e823f4ec877511193bb5237b39cb4e6491946839
                                                              • Instruction ID: db95aefadd78b778dbfc7a2789ace6e48ee836512b8e15800cd352dc99fc0742
                                                              • Opcode Fuzzy Hash: 07d76f340115ed574232e954e823f4ec877511193bb5237b39cb4e6491946839
                                                              • Instruction Fuzzy Hash: 1E018C31B101114BDBA595BDA45472FB2DADBCA720F208839E60EC7394ED66EC424399
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 43221ce502fa0bef948b661a459ea1203b1a183705b8b2baf42c7c411a65d8f5
                                                              • Instruction ID: 5ec3199468747cf28f193219b08456af6c0095143a27bc04a88a98d2d5914fe8
                                                              • Opcode Fuzzy Hash: 43221ce502fa0bef948b661a459ea1203b1a183705b8b2baf42c7c411a65d8f5
                                                              • Instruction Fuzzy Hash: A2018C71B004144FDBA696ACD89072F62DAEBCA720F208829E70AC7380DE26DC024385
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df2ebf089d2eb8222eb8ede5da92b7b703cbf53495010a9b658dde91b1e112c1
                                                              • Instruction ID: 3d8e44775735bfa386247ed78aac6b9d6e7c55ad62fcfa62eebcf5f5e20f18c8
                                                              • Opcode Fuzzy Hash: df2ebf089d2eb8222eb8ede5da92b7b703cbf53495010a9b658dde91b1e112c1
                                                              • Instruction Fuzzy Hash: 5801F236F145294FDF45D678E9183AF37BA9BC9200F05003AD90AD7384EEA5DC128BD1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f5ba59136c305e9471913dab4c6c8db15dd45e321ee03feb25508242b2515ee6
                                                              • Instruction ID: baf3030d41fb33ef4379be8012cf8c61a093adcfe53e2d37de8da032d0660694
                                                              • Opcode Fuzzy Hash: f5ba59136c305e9471913dab4c6c8db15dd45e321ee03feb25508242b2515ee6
                                                              • Instruction Fuzzy Hash: 9D014470B041105FDBA4D6BCE45471FB3D9EB86B14F11883AE70AC7794DD26DC028784
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f9c36fe7c488ccd05e891e67573d2df8d5e18d586caf8427e1b1378a7adba659
                                                              • Instruction ID: 0474c2134f3440eeea973a4ba1d035f0432ad8cdb13b4cf409acef51535100cd
                                                              • Opcode Fuzzy Hash: f9c36fe7c488ccd05e891e67573d2df8d5e18d586caf8427e1b1378a7adba659
                                                              • Instruction Fuzzy Hash: 0CE0D871E142099FDFB0CE74C95176E77A9EB03208F2048A6D904DB141FA33ED418781
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aa976699a50b98a0a6b50c08d3026a88d70fc42e5459dfcadbf44bb0d2ea6d04
                                                              • Instruction ID: 619c72e17d21bb0db57261e002215a11ca2c5287e01b1a9ff7a0af64bb56eae3
                                                              • Opcode Fuzzy Hash: aa976699a50b98a0a6b50c08d3026a88d70fc42e5459dfcadbf44bb0d2ea6d04
                                                              • Instruction Fuzzy Hash: F6E01271E10109ABDFA0DEB4C95576E77ADD702218F2088A6D909DB201F576DE414781
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-2049195972
                                                              • Opcode ID: 1e12c161ba83b79350b41e3bfe43080028e74d61b9f078520e20c3500d0d8d40
                                                              • Instruction ID: 5750fc88e05729c81e2c4f064b1656a797b971e20bb1cd5b925c2169f3a8d977
                                                              • Opcode Fuzzy Hash: 1e12c161ba83b79350b41e3bfe43080028e74d61b9f078520e20c3500d0d8d40
                                                              • Instruction Fuzzy Hash: D1120974E00219CFDB64DF69C954AAEB7B6FF89300F2085A9D50AEB255DB309D85CF80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-1110479544
                                                              • Opcode ID: ca2c21d4b5e1cddae14eaad3574eafccb63496cf6838552dd0d1f72ce45abca0
                                                              • Instruction ID: d5e68e7d78f158e4fee208a96f318834335f88a538033eae9fc9d21e66f0a957
                                                              • Opcode Fuzzy Hash: ca2c21d4b5e1cddae14eaad3574eafccb63496cf6838552dd0d1f72ce45abca0
                                                              • Instruction Fuzzy Hash: 7E918F70E00209DFDBA8EF64DA95B6EBBB2FF85700F108529E411EB294DB759C45CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .5}q$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-1622854337
                                                              • Opcode ID: e71b703a4452c9846ebc7f499d2c12e6edd37421f144ca7e0f1a460dfb4a235a
                                                              • Instruction ID: c2ff25342713e20a40f27c9e7f2b60edfcb70502c5fc77034c650fed32ffafc2
                                                              • Opcode Fuzzy Hash: e71b703a4452c9846ebc7f499d2c12e6edd37421f144ca7e0f1a460dfb4a235a
                                                              • Instruction Fuzzy Hash: BCF12874A00208CFDB55EBA8C954B6EB7B2FF85304F648569D505DB3A9DB31EC42CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq
                                                              • API String ID: 0-812946093
                                                              • Opcode ID: 1a5a1ce518b2b6493fd55dc2ba6ebf2f743fde236edc897e28935b770ccfe45e
                                                              • Instruction ID: 034dd2e3f13cbfa57dbf86163f28452f55754267b4208af88b1e7e24b004d5af
                                                              • Opcode Fuzzy Hash: 1a5a1ce518b2b6493fd55dc2ba6ebf2f743fde236edc897e28935b770ccfe45e
                                                              • Instruction Fuzzy Hash: 85B139B0B10208CFDB64EFA8C99466EB7B2EF85304F248569D506DB395DB75DC82CB84
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LReq$LReq$$eq$$eq
                                                              • API String ID: 0-731573373
                                                              • Opcode ID: c98031b7ff0fefd2cb38f1f0583ff7238f12dc47f55077986eb12baa1917c15b
                                                              • Instruction ID: ee5470ecf2778096fd3e497375b47dbb66ea58d61b2c7f16c188811265149433
                                                              • Opcode Fuzzy Hash: c98031b7ff0fefd2cb38f1f0583ff7238f12dc47f55077986eb12baa1917c15b
                                                              • Instruction Fuzzy Hash: 4A51AE70B002059FDB94EB78D981B6EB7A6FF89300F148569E506DB3A9DB31EC40CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368667683.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_68e0000_OHScaqAPjt.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq
                                                              • API String ID: 0-812946093
                                                              • Opcode ID: 17269bd41000f575e8d0294f07358776760f6a83e4921a7620816c43b45382c3
                                                              • Instruction ID: 0beb0db9bd3e3b089b2271d9c7d26b4f296ecabe1cebf1bac1f1215a678cba27
                                                              • Opcode Fuzzy Hash: 17269bd41000f575e8d0294f07358776760f6a83e4921a7620816c43b45382c3
                                                              • Instruction Fuzzy Hash: F951A034F102058FCFA9EB64D9806AEB7B6EF86701F14852AE916D7354DB31EC41CB91

                                                              Execution Graph

                                                              Execution Coverage:10.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:244
                                                              Total number of Limit Nodes:15
                                                              execution_graph 21619 124d730 DuplicateHandle 21620 124d7c6 21619->21620 21318 7c64f4d 21319 7c64ede 21318->21319 21320 7c64ee8 21319->21320 21326 7c66380 21319->21326 21341 7c66309 21319->21341 21356 7c66318 21319->21356 21371 7c663db 21319->21371 21387 7c66370 21319->21387 21327 7c6639a 21326->21327 21336 7c663a2 21327->21336 21402 7c667e6 21327->21402 21406 7c66cdc 21327->21406 21411 7c66f7f 21327->21411 21416 7c66c11 21327->21416 21421 7c66fd3 21327->21421 21425 7c669ac 21327->21425 21430 7c66b8e 21327->21430 21435 7c669ce 21327->21435 21439 7c6696e 21327->21439 21448 7c66a4e 21327->21448 21458 7c66862 21327->21458 21463 7c66907 21327->21463 21336->21320 21342 7c66337 21341->21342 21342->21320 21343 7c667e6 2 API calls 21342->21343 21344 7c66907 2 API calls 21342->21344 21345 7c66862 2 API calls 21342->21345 21346 7c66a4e 4 API calls 21342->21346 21347 7c6696e 4 API calls 21342->21347 21348 7c669ce 2 API calls 21342->21348 21349 7c66b8e 2 API calls 21342->21349 21350 7c669ac 2 API calls 21342->21350 21351 7c663a2 21342->21351 21352 7c66fd3 2 API calls 21342->21352 21353 7c66c11 2 API calls 21342->21353 21354 7c66f7f 2 API calls 21342->21354 21355 7c66cdc 2 API calls 21342->21355 21343->21351 21344->21351 21345->21351 21346->21351 21347->21351 21348->21351 21349->21351 21350->21351 21351->21320 21352->21351 21353->21351 21354->21351 21355->21351 21357 7c6632a 21356->21357 21357->21320 21358 7c663a2 21357->21358 21359 7c667e6 2 API calls 21357->21359 21360 7c66907 2 API calls 21357->21360 21361 7c66862 2 API calls 21357->21361 21362 7c66a4e 4 API calls 21357->21362 21363 7c6696e 4 API calls 21357->21363 21364 7c669ce 2 API calls 21357->21364 21365 7c66b8e 2 API calls 21357->21365 21366 7c669ac 2 API calls 21357->21366 21367 7c66fd3 2 API calls 21357->21367 21368 7c66c11 2 API calls 21357->21368 21369 7c66f7f 2 API calls 21357->21369 21370 7c66cdc 2 API calls 21357->21370 21358->21320 21359->21358 21360->21358 21361->21358 21362->21358 21363->21358 21364->21358 21365->21358 21366->21358 21367->21358 21368->21358 21369->21358 21370->21358 21372 7c663bf 21371->21372 21374 7c663de 21371->21374 21373 7c663a2 21372->21373 21375 7c667e6 2 API calls 21372->21375 21376 7c66907 2 API calls 21372->21376 21377 7c66862 2 API calls 21372->21377 21378 7c66a4e 4 API calls 21372->21378 21379 7c6696e 4 API calls 21372->21379 21380 7c669ce 2 API calls 21372->21380 21381 7c66b8e 2 API calls 21372->21381 21382 7c669ac 2 API calls 21372->21382 21383 7c66fd3 2 API calls 21372->21383 21384 7c66c11 2 API calls 21372->21384 21385 7c66f7f 2 API calls 21372->21385 21386 7c66cdc 2 API calls 21372->21386 21373->21320 21375->21373 21376->21373 21377->21373 21378->21373 21379->21373 21380->21373 21381->21373 21382->21373 21383->21373 21384->21373 21385->21373 21386->21373 21388 7c66380 21387->21388 21389 7c667e6 2 API calls 21388->21389 21390 7c66907 2 API calls 21388->21390 21391 7c66862 2 API calls 21388->21391 21392 7c66a4e 4 API calls 21388->21392 21393 7c6696e 4 API calls 21388->21393 21394 7c669ce 2 API calls 21388->21394 21395 7c66b8e 2 API calls 21388->21395 21396 7c669ac 2 API calls 21388->21396 21397 7c663a2 21388->21397 21398 7c66fd3 2 API calls 21388->21398 21399 7c66c11 2 API calls 21388->21399 21400 7c66f7f 2 API calls 21388->21400 21401 7c66cdc 2 API calls 21388->21401 21389->21397 21390->21397 21391->21397 21392->21397 21393->21397 21394->21397 21395->21397 21396->21397 21397->21320 21398->21397 21399->21397 21400->21397 21401->21397 21467 7c64a84 21402->21467 21471 7c64a90 21402->21471 21407 7c669c7 21406->21407 21408 7c66f8c 21407->21408 21475 7c64181 21407->21475 21479 7c64188 21407->21479 21412 7c669c7 21411->21412 21413 7c66f8c 21411->21413 21412->21411 21414 7c64181 ResumeThread 21412->21414 21415 7c64188 ResumeThread 21412->21415 21414->21412 21415->21412 21417 7c66c17 21416->21417 21483 7c648f1 21417->21483 21487 7c648f8 21417->21487 21418 7c66b19 21491 7c64808 21421->21491 21495 7c64801 21421->21495 21422 7c67001 21426 7c669b6 21425->21426 21427 7c66f8c 21426->21427 21428 7c64181 ResumeThread 21426->21428 21429 7c64188 ResumeThread 21426->21429 21428->21426 21429->21426 21431 7c66ba3 21430->21431 21432 7c66849 21430->21432 21433 7c64801 WriteProcessMemory 21431->21433 21434 7c64808 WriteProcessMemory 21431->21434 21433->21432 21434->21432 21499 7c64740 21435->21499 21503 7c64748 21435->21503 21436 7c669ec 21440 7c669c7 21439->21440 21441 7c66988 21439->21441 21443 7c66f8c 21440->21443 21444 7c64181 ResumeThread 21440->21444 21445 7c64188 ResumeThread 21440->21445 21507 7c64230 21441->21507 21511 7c64238 21441->21511 21442 7c670c4 21443->21336 21444->21440 21445->21440 21449 7c6697b 21448->21449 21450 7c66988 21449->21450 21452 7c669c7 21449->21452 21454 7c64230 Wow64SetThreadContext 21450->21454 21455 7c64238 Wow64SetThreadContext 21450->21455 21451 7c670c4 21453 7c66f8c 21452->21453 21456 7c64181 ResumeThread 21452->21456 21457 7c64188 ResumeThread 21452->21457 21453->21336 21454->21451 21455->21451 21456->21452 21457->21452 21459 7c66881 21458->21459 21461 7c64801 WriteProcessMemory 21459->21461 21462 7c64808 WriteProcessMemory 21459->21462 21460 7c66dd3 21461->21460 21462->21460 21465 7c64230 Wow64SetThreadContext 21463->21465 21466 7c64238 Wow64SetThreadContext 21463->21466 21464 7c66921 21464->21336 21465->21464 21466->21464 21468 7c64a90 CreateProcessA 21467->21468 21470 7c64cdb 21468->21470 21472 7c64b19 CreateProcessA 21471->21472 21474 7c64cdb 21472->21474 21476 7c64188 ResumeThread 21475->21476 21478 7c641f9 21476->21478 21478->21407 21480 7c641c8 ResumeThread 21479->21480 21482 7c641f9 21480->21482 21482->21407 21484 7c648f8 ReadProcessMemory 21483->21484 21486 7c64987 21484->21486 21486->21418 21488 7c64943 ReadProcessMemory 21487->21488 21490 7c64987 21488->21490 21490->21418 21492 7c64850 WriteProcessMemory 21491->21492 21494 7c648a7 21492->21494 21494->21422 21496 7c64808 WriteProcessMemory 21495->21496 21498 7c648a7 21496->21498 21498->21422 21500 7c64748 VirtualAllocEx 21499->21500 21502 7c647c5 21500->21502 21502->21436 21504 7c64788 VirtualAllocEx 21503->21504 21506 7c647c5 21504->21506 21506->21436 21508 7c64235 Wow64SetThreadContext 21507->21508 21510 7c642c5 21508->21510 21510->21442 21512 7c6427d Wow64SetThreadContext 21511->21512 21514 7c642c5 21512->21514 21514->21442 21515 1244668 21516 124467a 21515->21516 21517 1244686 21516->21517 21521 1244779 21516->21521 21526 1244210 21517->21526 21519 12446a5 21522 124479d 21521->21522 21530 1244888 21522->21530 21534 1244879 21522->21534 21527 124421b 21526->21527 21542 1245c54 21527->21542 21529 1246fec 21529->21519 21531 12448af 21530->21531 21532 124498c 21531->21532 21538 12444d4 21531->21538 21535 1244888 21534->21535 21536 124498c 21535->21536 21537 12444d4 CreateActCtxA 21535->21537 21536->21536 21537->21536 21539 1245918 CreateActCtxA 21538->21539 21541 12459db 21539->21541 21543 1245c5f 21542->21543 21546 1245c74 21543->21546 21545 1247185 21545->21529 21547 1245c7f 21546->21547 21550 1245ca4 21547->21550 21549 1247262 21549->21545 21551 1245caf 21550->21551 21554 1245cd4 21551->21554 21553 1247365 21553->21549 21555 1245cdf 21554->21555 21557 124866b 21555->21557 21560 124ad19 21555->21560 21556 12486a9 21556->21553 21557->21556 21566 124ce08 21557->21566 21561 124ad22 21560->21561 21563 124acbe 21560->21563 21573 124ad50 21561->21573 21576 124ad3f 21561->21576 21562 124ad2e 21562->21557 21563->21557 21567 124ce39 21566->21567 21568 124ce5d 21567->21568 21585 124cf85 21567->21585 21589 124cfc8 21567->21589 21593 124cfc7 21567->21593 21597 124cf97 21567->21597 21568->21556 21580 124ae38 21573->21580 21574 124ad5f 21574->21562 21577 124ad50 21576->21577 21579 124ae38 GetModuleHandleW 21577->21579 21578 124ad5f 21578->21562 21579->21578 21581 124ae7c 21580->21581 21582 124ae59 21580->21582 21581->21574 21582->21581 21583 124b080 GetModuleHandleW 21582->21583 21584 124b0ad 21583->21584 21584->21574 21586 124cfd6 21585->21586 21587 124d00f 21586->21587 21601 124bba0 21586->21601 21587->21568 21590 124cfd5 21589->21590 21591 124bba0 GetModuleHandleW 21590->21591 21592 124d00f 21590->21592 21591->21592 21592->21568 21594 124cfd5 21593->21594 21595 124d00f 21594->21595 21596 124bba0 GetModuleHandleW 21594->21596 21595->21568 21596->21595 21598 124d006 21597->21598 21599 124d00f 21598->21599 21600 124bba0 GetModuleHandleW 21598->21600 21599->21568 21600->21599 21602 124bbab 21601->21602 21604 124dd28 21602->21604 21605 124d1c4 21602->21605 21604->21604 21606 124d1cf 21605->21606 21607 1245cd4 GetModuleHandleW 21606->21607 21608 124dd97 21607->21608 21608->21604 21609 124d4e8 21610 124d52e GetCurrentProcess 21609->21610 21612 124d580 GetCurrentThread 21610->21612 21613 124d579 21610->21613 21614 124d5b6 21612->21614 21615 124d5bd GetCurrentProcess 21612->21615 21613->21612 21614->21615 21618 124d5f3 21615->21618 21616 124d61b GetCurrentThreadId 21617 124d64c 21616->21617 21618->21616 21621 7c679f8 21622 7c67b83 21621->21622 21624 7c67a1e 21621->21624 21624->21622 21625 7c67538 21624->21625 21626 7c67c78 PostMessageW 21625->21626 21627 7c67ce4 21626->21627 21627->21624

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 294 124d4d8-124d4e0 295 124d4e2-124d577 GetCurrentProcess 294->295 296 124d49b-124f66a 294->296 308 124d580-124d5b4 GetCurrentThread 295->308 309 124d579-124d57f 295->309 302 124f917-124f91e 296->302 303 124f670-124f695 call 124f0ec 296->303 315 124f697-124f69b 303->315 316 124f6a1-124f6a3 303->316 310 124d5b6-124d5bc 308->310 311 124d5bd-124d5f1 GetCurrentProcess 308->311 309->308 310->311 313 124d5f3-124d5f9 311->313 314 124d5fa-124d615 call 124d6b7 311->314 313->314 326 124d61b-124d64a GetCurrentThreadId 314->326 315->316 318 124f862-124f864 315->318 319 124f6a5-124f6af 316->319 320 124f6b1 316->320 324 124f866-124f86e 318->324 325 124f870 318->325 322 124f6b6-124f6bb 319->322 320->322 327 124f6bd-124f6cb 322->327 328 124f6fa-124f6fc 322->328 329 124f872-124f874 324->329 325->329 330 124d653-124d6b5 326->330 331 124d64c-124d652 326->331 327->328 341 124f6cd-124f6d6 call 124f0f8 327->341 333 124f6fe-124f702 328->333 334 124f70b-124f712 328->334 329->302 332 124f87a-124f8fb call 124f144 call 124f108 329->332 331->330 332->302 370 124f8fd-124f912 call 124f124 call 124f160 332->370 333->334 334->302 336 124f718-124f71a 334->336 339 124f720-124f777 call 124f108 call 124f118 336->339 340 124f7a3-124f7da call 124f144 336->340 371 124f794-124f7a2 call 124d2b8 339->371 372 124f779-124f78f call 124f124 call 124f134 339->372 360 124f7dc-124f7e3 call 124f150 340->360 361 124f7e8-124f83e call 124f108 call 124f118 340->361 341->328 353 124f6d8-124f6f1 341->353 353->328 360->361 385 124f840-124f855 call 124f124 call 124f160 361->385 386 124f85a-124f861 361->386 370->302 372->371 385->386
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 0124D566
                                                              • GetCurrentThread.KERNEL32 ref: 0124D5A3
                                                              • GetCurrentProcess.KERNEL32 ref: 0124D5E0
                                                              • GetCurrentThreadId.KERNEL32 ref: 0124D639
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 269b9c8b339cb1a7abe379cb059e8356cfe9f2f7045a0a50d97cf2e5e2eb5201
                                                              • Instruction ID: 5f1b60d06aab553059984329be56322e0d0d4c865899b9d700b415cca1b689ac
                                                              • Opcode Fuzzy Hash: 269b9c8b339cb1a7abe379cb059e8356cfe9f2f7045a0a50d97cf2e5e2eb5201
                                                              • Instruction Fuzzy Hash: E9B1A075A102098FDB18DFADD944BAEBBF1FF88304F248469E509AB361DB319945CF60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 391 124d4e8-124d577 GetCurrentProcess 395 124d580-124d5b4 GetCurrentThread 391->395 396 124d579-124d57f 391->396 397 124d5b6-124d5bc 395->397 398 124d5bd-124d5f1 GetCurrentProcess 395->398 396->395 397->398 399 124d5f3-124d5f9 398->399 400 124d5fa-124d615 call 124d6b7 398->400 399->400 404 124d61b-124d64a GetCurrentThreadId 400->404 405 124d653-124d6b5 404->405 406 124d64c-124d652 404->406 406->405
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 0124D566
                                                              • GetCurrentThread.KERNEL32 ref: 0124D5A3
                                                              • GetCurrentProcess.KERNEL32 ref: 0124D5E0
                                                              • GetCurrentThreadId.KERNEL32 ref: 0124D639
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 5d0e2885207ee5e52b6e59e3e86d257ffad1044e8d9f65d6f1a91818d14557a7
                                                              • Instruction ID: b1b6900e72fb78d4b231690a317b30f247f920712d8c671a54cd33b3a02996b4
                                                              • Opcode Fuzzy Hash: 5d0e2885207ee5e52b6e59e3e86d257ffad1044e8d9f65d6f1a91818d14557a7
                                                              • Instruction Fuzzy Hash: 5D5156B19103098FDB18CFAAD948B9EBFF5EF98314F208459E119A7360DB349944CF65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 436 7c64a84-7c64b25 439 7c64b27-7c64b31 436->439 440 7c64b5e-7c64b7e 436->440 439->440 441 7c64b33-7c64b35 439->441 445 7c64bb7-7c64be6 440->445 446 7c64b80-7c64b8a 440->446 443 7c64b37-7c64b41 441->443 444 7c64b58-7c64b5b 441->444 447 7c64b45-7c64b54 443->447 448 7c64b43 443->448 444->440 456 7c64c1f-7c64cd9 CreateProcessA 445->456 457 7c64be8-7c64bf2 445->457 446->445 449 7c64b8c-7c64b8e 446->449 447->447 450 7c64b56 447->450 448->447 451 7c64b90-7c64b9a 449->451 452 7c64bb1-7c64bb4 449->452 450->444 454 7c64b9e-7c64bad 451->454 455 7c64b9c 451->455 452->445 454->454 458 7c64baf 454->458 455->454 468 7c64ce2-7c64d68 456->468 469 7c64cdb-7c64ce1 456->469 457->456 459 7c64bf4-7c64bf6 457->459 458->452 460 7c64bf8-7c64c02 459->460 461 7c64c19-7c64c1c 459->461 463 7c64c06-7c64c15 460->463 464 7c64c04 460->464 461->456 463->463 465 7c64c17 463->465 464->463 465->461 479 7c64d6a-7c64d6e 468->479 480 7c64d78-7c64d7c 468->480 469->468 479->480 483 7c64d70 479->483 481 7c64d7e-7c64d82 480->481 482 7c64d8c-7c64d90 480->482 481->482 484 7c64d84 481->484 485 7c64d92-7c64d96 482->485 486 7c64da0-7c64da4 482->486 483->480 484->482 485->486 487 7c64d98 485->487 488 7c64db6-7c64dbd 486->488 489 7c64da6-7c64dac 486->489 487->486 490 7c64dd4 488->490 491 7c64dbf-7c64dce 488->491 489->488 492 7c64dd5 490->492 491->490 492->492
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07C64CC6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 18aafdd9f251d11de3b70af7078d5f1b5118ae07186345c4707e80cdb354f8ff
                                                              • Instruction ID: 1da6831786f6e3646c7064e5d2ee1bbd00ef2091f37a1014aa61440e5db3bc88
                                                              • Opcode Fuzzy Hash: 18aafdd9f251d11de3b70af7078d5f1b5118ae07186345c4707e80cdb354f8ff
                                                              • Instruction Fuzzy Hash: 9FA13BB1D0065ADFDB18CFA8C8C5BEDBBB2BF48310F148569D818A7250DB749A85CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 494 7c64a90-7c64b25 496 7c64b27-7c64b31 494->496 497 7c64b5e-7c64b7e 494->497 496->497 498 7c64b33-7c64b35 496->498 502 7c64bb7-7c64be6 497->502 503 7c64b80-7c64b8a 497->503 500 7c64b37-7c64b41 498->500 501 7c64b58-7c64b5b 498->501 504 7c64b45-7c64b54 500->504 505 7c64b43 500->505 501->497 513 7c64c1f-7c64cd9 CreateProcessA 502->513 514 7c64be8-7c64bf2 502->514 503->502 506 7c64b8c-7c64b8e 503->506 504->504 507 7c64b56 504->507 505->504 508 7c64b90-7c64b9a 506->508 509 7c64bb1-7c64bb4 506->509 507->501 511 7c64b9e-7c64bad 508->511 512 7c64b9c 508->512 509->502 511->511 515 7c64baf 511->515 512->511 525 7c64ce2-7c64d68 513->525 526 7c64cdb-7c64ce1 513->526 514->513 516 7c64bf4-7c64bf6 514->516 515->509 517 7c64bf8-7c64c02 516->517 518 7c64c19-7c64c1c 516->518 520 7c64c06-7c64c15 517->520 521 7c64c04 517->521 518->513 520->520 522 7c64c17 520->522 521->520 522->518 536 7c64d6a-7c64d6e 525->536 537 7c64d78-7c64d7c 525->537 526->525 536->537 540 7c64d70 536->540 538 7c64d7e-7c64d82 537->538 539 7c64d8c-7c64d90 537->539 538->539 541 7c64d84 538->541 542 7c64d92-7c64d96 539->542 543 7c64da0-7c64da4 539->543 540->537 541->539 542->543 544 7c64d98 542->544 545 7c64db6-7c64dbd 543->545 546 7c64da6-7c64dac 543->546 544->543 547 7c64dd4 545->547 548 7c64dbf-7c64dce 545->548 546->545 549 7c64dd5 547->549 548->547 549->549
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07C64CC6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: cd8d77788f67a75bee8fd496e98da9534eca41d601d0588dad8c47586b386b30
                                                              • Instruction ID: 1ee9cb67c9fd612b8ad471c95fbaebd526e2521d195150e21d1c05fa223d9a7b
                                                              • Opcode Fuzzy Hash: cd8d77788f67a75bee8fd496e98da9534eca41d601d0588dad8c47586b386b30
                                                              • Instruction Fuzzy Hash: 0E913CB1D0065ADFDB18CFA8C8C5BADBBB2BF48310F148569D818A7250DB749B85CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 551 124ae38-124ae57 552 124ae83-124ae87 551->552 553 124ae59-124ae66 call 12497c0 551->553 554 124ae89-124ae93 552->554 555 124ae9b-124aedc 552->555 558 124ae7c 553->558 559 124ae68 553->559 554->555 562 124aede-124aee6 555->562 563 124aee9-124aef7 555->563 558->552 606 124ae6e call 124b0e0 559->606 607 124ae6e call 124b0d0 559->607 562->563 565 124aef9-124aefe 563->565 566 124af1b-124af1d 563->566 564 124ae74-124ae76 564->558 569 124afb8-124b078 564->569 567 124af00-124af07 call 124a190 565->567 568 124af09 565->568 570 124af20-124af27 566->570 572 124af0b-124af19 567->572 568->572 601 124b080-124b0ab GetModuleHandleW 569->601 602 124b07a-124b07d 569->602 573 124af34-124af3b 570->573 574 124af29-124af31 570->574 572->570 576 124af3d-124af45 573->576 577 124af48-124af51 call 124a1a0 573->577 574->573 576->577 582 124af53-124af5b 577->582 583 124af5e-124af63 577->583 582->583 585 124af65-124af6c 583->585 586 124af81-124af8e 583->586 585->586 587 124af6e-124af7e call 124a1b0 call 124a1c0 585->587 592 124af90-124afae 586->592 593 124afb1-124afb7 586->593 587->586 592->593 603 124b0b4-124b0c8 601->603 604 124b0ad-124b0b3 601->604 602->601 604->603 606->564 607->564
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0124B09E
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: d3a4836600476e297df8ce9d5c8807f749df5c5e4eae1a530083d6c0ef0321e8
                                                              • Instruction ID: 2c80bb69b2e95e27622c4bd1428a85f4d2adefe9a24e38f57c3d1c9f9ad2b51f
                                                              • Opcode Fuzzy Hash: d3a4836600476e297df8ce9d5c8807f749df5c5e4eae1a530083d6c0ef0321e8
                                                              • Instruction Fuzzy Hash: 1D8168B0A10B068FE728DF29C44575ABBF5FF88304F00892DE69AD7A40DB75E845CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 716 12444d4-12459d9 CreateActCtxA 719 12459e2-1245a3c 716->719 720 12459db-12459e1 716->720 727 1245a3e-1245a41 719->727 728 1245a4b-1245a4f 719->728 720->719 727->728 729 1245a60 728->729 730 1245a51-1245a5d 728->730 732 1245a61 729->732 730->729 732->732
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 012459C9
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 35b06c4614a58f589f63066843327f5709cb121f07c38aa1339316797f889731
                                                              • Instruction ID: 0c60b27e90ba9fabdf61059995b8a39da18c48818a8bcab0608f59cfa97ba04c
                                                              • Opcode Fuzzy Hash: 35b06c4614a58f589f63066843327f5709cb121f07c38aa1339316797f889731
                                                              • Instruction Fuzzy Hash: 1341F0B1C1071DCBDB28CFA9C884B8DBBF5BF49304F20816AD548AB251DBB16949CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 733 124590c-12459d9 CreateActCtxA 735 12459e2-1245a3c 733->735 736 12459db-12459e1 733->736 743 1245a3e-1245a41 735->743 744 1245a4b-1245a4f 735->744 736->735 743->744 745 1245a60 744->745 746 1245a51-1245a5d 744->746 748 1245a61 745->748 746->745 748->748
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 012459C9
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 2a832b0367bb08fdae1e112ef604ef1045239414f4e35d3438e4b6c4dfddd8b4
                                                              • Instruction ID: 9dc4ab20cda7b354b7e8e7f17cc7e47e51ddecc7becd2bd53b00b72a824cbc1a
                                                              • Opcode Fuzzy Hash: 2a832b0367bb08fdae1e112ef604ef1045239414f4e35d3438e4b6c4dfddd8b4
                                                              • Instruction Fuzzy Hash: EF4110B5C1071DCBDB28CFA9C984B8DBBF1BF48304F20816AD548AB251DB71694ACF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 749 7c64801-7c64856 752 7c64866-7c648a5 WriteProcessMemory 749->752 753 7c64858-7c64864 749->753 755 7c648a7-7c648ad 752->755 756 7c648ae-7c648de 752->756 753->752 755->756
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07C64898
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: c7bc19df3eeb9865ba3479ef8026792a9575c61ed74a6d4160ffcf1528fe050d
                                                              • Instruction ID: 96988ce67789b2e785d1b5f7c6b5d16567b1551107846f1071a6a7d919600a52
                                                              • Opcode Fuzzy Hash: c7bc19df3eeb9865ba3479ef8026792a9575c61ed74a6d4160ffcf1528fe050d
                                                              • Instruction Fuzzy Hash: EE215AB1D003599FCB10CFA9C984BDEBBF5FF48310F10882AE918A7241D7749A44CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 760 7c64808-7c64856 762 7c64866-7c648a5 WriteProcessMemory 760->762 763 7c64858-7c64864 760->763 765 7c648a7-7c648ad 762->765 766 7c648ae-7c648de 762->766 763->762 765->766
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07C64898
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 00e209bcec6937f8a0fbc55de59f560129a5104db299e8b4da332061e5b82766
                                                              • Instruction ID: 51a46568fab3a01fed7dcd055e020ed3e07044eec554964fc38434eb532bfe92
                                                              • Opcode Fuzzy Hash: 00e209bcec6937f8a0fbc55de59f560129a5104db299e8b4da332061e5b82766
                                                              • Instruction Fuzzy Hash: 72213BB1D003599FCB14CFA9C985BDEBBF5FF48310F108429E918A7240D7749A44DB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 770 7c64230-7c64283 774 7c64285-7c64291 770->774 775 7c64293-7c642c3 Wow64SetThreadContext 770->775 774->775 777 7c642c5-7c642cb 775->777 778 7c642cc-7c642fc 775->778 777->778
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07C642B6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 84c35716e17a97d5f964ef6a729b73a77ab1e4d76a6cbee9c5732cd6376083ae
                                                              • Instruction ID: a50ea8004accb721a2663206b5094eb6730a4b4ea64e75794e5f06ea3e0e406c
                                                              • Opcode Fuzzy Hash: 84c35716e17a97d5f964ef6a729b73a77ab1e4d76a6cbee9c5732cd6376083ae
                                                              • Instruction Fuzzy Hash: 63216AB1D003499FDB14CFAAC4847AEBFF5EF48324F14842AD558A7241DB789A44CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 782 7c648f1-7c64985 ReadProcessMemory 786 7c64987-7c6498d 782->786 787 7c6498e-7c649be 782->787 786->787
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07C64978
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: c176d787d812306731e2809f8e4a2439544307ca409688f49a090bb3799792b1
                                                              • Instruction ID: 9491afab2dae4fd4c49ab3db628801d5884d2fa77e264ae92ac1832aa4cd622d
                                                              • Opcode Fuzzy Hash: c176d787d812306731e2809f8e4a2439544307ca409688f49a090bb3799792b1
                                                              • Instruction Fuzzy Hash: 732119B19003599FCB10DF99C884ADEFBF5FF48310F10842AE558A7250D7749544DBA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 791 124d728-124d7c4 DuplicateHandle 792 124d7c6-124d7cc 791->792 793 124d7cd-124d7ea 791->793 792->793
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0124D7B7
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 4c760d023ae93d37103bfc585f636d7ed2ff743671c4a0aef43dbf17666e669e
                                                              • Instruction ID: 2609b1a9488898735177a60a8bfd061572a2f6b3fee2f3022126022d41544ef6
                                                              • Opcode Fuzzy Hash: 4c760d023ae93d37103bfc585f636d7ed2ff743671c4a0aef43dbf17666e669e
                                                              • Instruction Fuzzy Hash: F121E0B5D00249DFDB14CFA9D985ADEBBF4EB48320F14841AE958A3351D378A944DF60
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07C642B6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: f5ffce0894882b7d21db045280a4701408d36866a38ed7c4c9d7c1c1d1f3a4fd
                                                              • Instruction ID: 399a5cbde7af44fe7b9c75966f0fea07c7793818d23a5a0218fbce4621c36a6b
                                                              • Opcode Fuzzy Hash: f5ffce0894882b7d21db045280a4701408d36866a38ed7c4c9d7c1c1d1f3a4fd
                                                              • Instruction Fuzzy Hash: 92215BB1D003098FDB14DFAAC4857EEBBF5EF48324F14842AD559A7241DB789A44CFA0
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07C64978
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 5bd124f068a2d1c536522b25ea5efed32866391832763c3a5042816442237b6d
                                                              • Instruction ID: 4a599b67a397cd4cb674d04cddaa5a99b28f362d7dc90fee5565ba321ae59433
                                                              • Opcode Fuzzy Hash: 5bd124f068a2d1c536522b25ea5efed32866391832763c3a5042816442237b6d
                                                              • Instruction Fuzzy Hash: 2F2139B1C003599FCB10CFAAC884AEEFBF5FF48320F10842AE558A7250D7749944DBA0
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0124D7B7
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: e4c293b1fd29e70222eb9b905da8288ea45b3d0fd44933c7c0b5339f902013bc
                                                              • Instruction ID: 8f6e52d279b697c7b40669809cec9b9b371c885f18a26cb78de184599aa1d9fd
                                                              • Opcode Fuzzy Hash: e4c293b1fd29e70222eb9b905da8288ea45b3d0fd44933c7c0b5339f902013bc
                                                              • Instruction Fuzzy Hash: 9D21E4B5900249DFDB10CF9AD984ADEBFF8EB48310F14841AE914A3311D374A944DFA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07C647B6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 1f6c4249ff1fdfd196d9a13e126f8107a0b12306c18daefde2285ec25990ea3d
                                                              • Instruction ID: 374e8f5abe4bc4b565b07ce4cfdbb882c8fc4e5ee9cde2bd0ece47bd4903f9db
                                                              • Opcode Fuzzy Hash: 1f6c4249ff1fdfd196d9a13e126f8107a0b12306c18daefde2285ec25990ea3d
                                                              • Instruction Fuzzy Hash: F5116AB1C002499FCB14DFA9C884ADEBFF5EF89320F14841AE955A7250CB759A54DFA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07C647B6
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 1ddb9beb2e533f7d0ec8968d11312212448c694302e17d07acfc73b490f3a4ac
                                                              • Instruction ID: d7c3be9495e2a997c71bbca3690531d2b6b9120718fe3a073cb607975ca09e76
                                                              • Opcode Fuzzy Hash: 1ddb9beb2e533f7d0ec8968d11312212448c694302e17d07acfc73b490f3a4ac
                                                              • Instruction Fuzzy Hash: FA117C718002499FCB10DFA9C884ADFBFF5EF48320F148419E515A7250C7759540CFA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: d03de64587ab992012366e02d7e5d4a77b77b6726041c2f2391dfa4b8d796277
                                                              • Instruction ID: ac5cb288ec4cf5378380798c13f6c13617d53dd81ee377ae2f4a8b2656d38394
                                                              • Opcode Fuzzy Hash: d03de64587ab992012366e02d7e5d4a77b77b6726041c2f2391dfa4b8d796277
                                                              • Instruction Fuzzy Hash: 0B1149B19003498BDB14DFAAC88579EFBF4EB88320F248819D559A7240DB756944CB94
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 3271bb28fa15c342f86e6e638869c87e40146d21cd57b461168920af6420a794
                                                              • Instruction ID: 4d86eaefb93b081a96925ae9336cc9d41660ea7e1e9a17282584c2833dde344d
                                                              • Opcode Fuzzy Hash: 3271bb28fa15c342f86e6e638869c87e40146d21cd57b461168920af6420a794
                                                              • Instruction Fuzzy Hash: 3F116AB1D003498FDB24DFAAC88479EFBF8EF88320F248419D519A7240DB756A44CFA4
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0124B09E
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2236210399.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Offset: 01240000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1240000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 3ca2eb37c4b912397d36a618f1a4a71eb040dc1a51dea540e2417a4def1ace54
                                                              • Instruction ID: 762f61c18bb2de29cb63baec958af047b7369eac8486b560df8a5c3d4a208d29
                                                              • Opcode Fuzzy Hash: 3ca2eb37c4b912397d36a618f1a4a71eb040dc1a51dea540e2417a4def1ace54
                                                              • Instruction Fuzzy Hash: 7211E3B6C003498FDB14CF9AC444BDEFBF4EB88314F14841AD569A7610D375A545CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07C67CD5
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 858a9df3ac8e8991335ed54b431196aaad95d45c6ad13bf1b7386f69372e7ed8
                                                              • Instruction ID: 72da3cc27ed0dfd348bb382e5250db072bddd74a5d4cc6c95ac52980bc8f6add
                                                              • Opcode Fuzzy Hash: 858a9df3ac8e8991335ed54b431196aaad95d45c6ad13bf1b7386f69372e7ed8
                                                              • Instruction Fuzzy Hash: 321106B5800349DFCB10CF9AC989BDEBBF8EB48324F108819E558A7600D375A944CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07C67CD5
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2242727785.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7c60000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 0f48af71d968e162e069bc46fcf86e36bfbf8cad49820d186950640d8b0611c4
                                                              • Instruction ID: 9c392f43fa8037030055eb43af0cd4333889413c9781d4453d78c69f9170e1f1
                                                              • Opcode Fuzzy Hash: 0f48af71d968e162e069bc46fcf86e36bfbf8cad49820d186950640d8b0611c4
                                                              • Instruction Fuzzy Hash: 721106B5800349DFCB10CF99D985BDEBFF8EB48324F10881AE554A7610C375A544CFA1
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235446364.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11dd000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 95525aa473e9c5f1dca1b3e54918c19d4b3b7a0240b73b96c72910e542355144
                                                              • Instruction ID: a25e157dc887597052e2b72531d62eb71d559d4995fcf8390e0d6d714790472e
                                                              • Opcode Fuzzy Hash: 95525aa473e9c5f1dca1b3e54918c19d4b3b7a0240b73b96c72910e542355144
                                                              • Instruction Fuzzy Hash: C221D671504240DFDF0ADF98E9C4B27BF65FB88320F24C569E9050B286C336D416CBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235446364.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11dd000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 667d0a771fe2491f742e962a94765d6d45f2fa856c012f71484b98421cea63d4
                                                              • Instruction ID: 69976dce29c57228bc9ebfaa0bd3f5aecda7616301139ea20c58859579633481
                                                              • Opcode Fuzzy Hash: 667d0a771fe2491f742e962a94765d6d45f2fa856c012f71484b98421cea63d4
                                                              • Instruction Fuzzy Hash: B82148B1104200DFDF09DF98E9C0B66BF65FB88324F20C56CD9090B686C33AE406C7A2
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235558639.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11ed000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ae947de019c0659230127ffef3c08870dbae38f33a6c5f26018b67dc7d9d7cc
                                                              • Instruction ID: 57917534552fbb3929cdbb7ef2db8e30f9f102fa6f8dc8ed04a3e122b3082409
                                                              • Opcode Fuzzy Hash: 1ae947de019c0659230127ffef3c08870dbae38f33a6c5f26018b67dc7d9d7cc
                                                              • Instruction Fuzzy Hash: 04212571504600DFCF19DF98E988B16BFA5FB84314F28C56DD80A0B246C33BD407CA62
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235558639.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11ed000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be171510977ec1416a6757345c87bcf62dbba954ce30cde9d8a8de959415a72c
                                                              • Instruction ID: 82a4fcad552ab605bfad7ee7a3aa1b6ccfce15824e7ee994bdd404defe7f6e86
                                                              • Opcode Fuzzy Hash: be171510977ec1416a6757345c87bcf62dbba954ce30cde9d8a8de959415a72c
                                                              • Instruction Fuzzy Hash: F2210775504601DFDF0ADFD8E9C8B26BBA5FB84324F24C56DE9094B296C336D406CA62
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235558639.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11ed000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e87145bbafae1019b0436db4176336d11707141dd36d8d580334fa0c2ba4626
                                                              • Instruction ID: d59680bdde0e9e0f0c7611eb1c91c75b346a467d15861869674911729eade90a
                                                              • Opcode Fuzzy Hash: 6e87145bbafae1019b0436db4176336d11707141dd36d8d580334fa0c2ba4626
                                                              • Instruction Fuzzy Hash: D221C2355093808FCB07CF64D994715BFB1EB46214F28C1DAD8498F2A7C33A980ACB62
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235446364.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11dd000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b7ddd7a086731bdfc3d36347521231777b7f6d018e947c39a7212cc8184ef59
                                                              • Instruction ID: 36ffe30b8dda9b24d4667cca2b50546cb7e63bd3f1934bbc8e9a81d4d902ed0d
                                                              • Opcode Fuzzy Hash: 9b7ddd7a086731bdfc3d36347521231777b7f6d018e947c39a7212cc8184ef59
                                                              • Instruction Fuzzy Hash: 16219D76504240DFDF06CF54D9C4B16BF72FB84324F24C5A9DD090A69AC33AD42ACBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235446364.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11dd000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                                              • Instruction ID: f04f73c4d8db5fca505025726fc550b16f5a9065be44d590512d97da703ab4ad
                                                              • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                                              • Instruction Fuzzy Hash: 2E11DF76404240DFDF16CF44D5C4B56BF71FB84324F24C2A9D9090B656C33AE45ACBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235558639.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11ed000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                                              • Instruction ID: a995314aecd9b6d39c89b36b857a92ebf2d6df1e2824b30e214c14f4e852c175
                                                              • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                                              • Instruction Fuzzy Hash: 5D11BB79504680DFDB06CF94D6C8B15FBA1FB84324F24C6ADD8494B296C33AD40ACB62
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235446364.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11dd000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 25d9566b776817da954356dfb994757aac94312209b469c3c30a54170c11f008
                                                              • Instruction ID: c31ff5be8888c4dc139d3044eeb3cf28b798d7bfbfcf413b491393bdc60b2bab
                                                              • Opcode Fuzzy Hash: 25d9566b776817da954356dfb994757aac94312209b469c3c30a54170c11f008
                                                              • Instruction Fuzzy Hash: CD012B710047849AEB298F99DDC4B27BFD8DF41338F19C59AED080A2C7D3799840C6B2
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2235446364.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_11dd000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ca55508794143190c1328d4af95222529820f53ba44a9c4963fa2131be16b4f3
                                                              • Instruction ID: f3efe72e49e34c498e01b09a5b388decf96c05d65031f770b25286818bf453e1
                                                              • Opcode Fuzzy Hash: ca55508794143190c1328d4af95222529820f53ba44a9c4963fa2131be16b4f3
                                                              • Instruction Fuzzy Hash: 89F0C272404384AAEB258E59D9C8B63FFD8EB51634F18C45AED084A28AC3799840CBB1

                                                              Execution Graph

                                                              Execution Coverage:11.8%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:17
                                                              Total number of Limit Nodes:4
                                                              execution_graph 25108 1920848 25110 192084e 25108->25110 25109 192091b 25110->25109 25112 1921380 25110->25112 25114 1921396 25112->25114 25113 1921480 25113->25110 25114->25113 25116 1927eb0 25114->25116 25117 1927eba 25116->25117 25118 1927ed4 25117->25118 25121 6eefa09 25117->25121 25125 6eefa18 25117->25125 25118->25114 25123 6eefa2d 25121->25123 25122 6eefc42 25122->25118 25123->25122 25124 6eefc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 25123->25124 25124->25123 25127 6eefa2d 25125->25127 25126 6eefc42 25126->25118 25127->25126 25128 6eefc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 25127->25128 25128->25127

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 126 6ee3040-6ee3061 127 6ee3063-6ee3066 126->127 128 6ee306c-6ee308b 127->128 129 6ee3807-6ee380a 127->129 139 6ee308d-6ee3090 128->139 140 6ee30a4-6ee30ae 128->140 130 6ee380c-6ee382b 129->130 131 6ee3830-6ee3832 129->131 130->131 133 6ee3839-6ee383c 131->133 134 6ee3834 131->134 133->127 136 6ee3842-6ee384b 133->136 134->133 139->140 141 6ee3092-6ee30a2 139->141 143 6ee30b4-6ee30c3 140->143 141->143 252 6ee30c5 call 6ee3859 143->252 253 6ee30c5 call 6ee3860 143->253 145 6ee30ca-6ee30cf 146 6ee30dc-6ee33b9 145->146 147 6ee30d1-6ee30d7 145->147 168 6ee33bf-6ee346e 146->168 169 6ee37f9-6ee3806 146->169 147->136 178 6ee3497 168->178 179 6ee3470-6ee3495 168->179 181 6ee34a0-6ee34b3 178->181 179->181 183 6ee34b9-6ee34db 181->183 184 6ee37e0-6ee37ec 181->184 183->184 187 6ee34e1-6ee34eb 183->187 184->168 185 6ee37f2 184->185 185->169 187->184 188 6ee34f1-6ee34fc 187->188 188->184 189 6ee3502-6ee35d8 188->189 201 6ee35da-6ee35dc 189->201 202 6ee35e6-6ee3616 189->202 201->202 206 6ee3618-6ee361a 202->206 207 6ee3624-6ee3630 202->207 206->207 208 6ee3632-6ee3636 207->208 209 6ee3690-6ee3694 207->209 208->209 212 6ee3638-6ee3662 208->212 210 6ee369a-6ee36d6 209->210 211 6ee37d1-6ee37da 209->211 222 6ee36d8-6ee36da 210->222 223 6ee36e4-6ee36f2 210->223 211->184 211->189 219 6ee3664-6ee3666 212->219 220 6ee3670-6ee368d 212->220 219->220 220->209 222->223 226 6ee3709-6ee3714 223->226 227 6ee36f4-6ee36ff 223->227 230 6ee372c-6ee373d 226->230 231 6ee3716-6ee371c 226->231 227->226 232 6ee3701 227->232 236 6ee373f-6ee3745 230->236 237 6ee3755-6ee3761 230->237 233 6ee371e 231->233 234 6ee3720-6ee3722 231->234 232->226 233->230 234->230 238 6ee3749-6ee374b 236->238 239 6ee3747 236->239 241 6ee3779-6ee37ca 237->241 242 6ee3763-6ee3769 237->242 238->237 239->237 241->211 243 6ee376d-6ee376f 242->243 244 6ee376b 242->244 243->241 244->241 252->145 253->145
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-220072568
                                                              • Opcode ID: 25dc54bf4459d41b028c6a52caa5728fa22562698633916c7ce182086e03bbc1
                                                              • Instruction ID: 70219f60bb6ddf020f90ff9fd6e5f231ef2661740f90492785941f7e31b5aba2
                                                              • Opcode Fuzzy Hash: 25dc54bf4459d41b028c6a52caa5728fa22562698633916c7ce182086e03bbc1
                                                              • Instruction Fuzzy Hash: F6321C30E1071ACBCB15DF79D89459DF7B2FFC9300F6096AAD409A7264EB30A985CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 797 6ee7d68-6ee7d86 798 6ee7d88-6ee7d8b 797->798 799 6ee7d8d-6ee7d9b 798->799 800 6ee7da2-6ee7da5 798->800 809 6ee7e0e-6ee7e24 799->809 810 6ee7d9d 799->810 801 6ee7dc6-6ee7dc9 800->801 802 6ee7da7-6ee7dc1 800->802 803 6ee7dcb-6ee7dd5 801->803 804 6ee7dd6-6ee7dd9 801->804 802->801 807 6ee7dfc-6ee7dfe 804->807 808 6ee7ddb-6ee7df7 804->808 811 6ee7e05-6ee7e08 807->811 812 6ee7e00 807->812 808->807 816 6ee803f-6ee8049 809->816 817 6ee7e2a-6ee7e33 809->817 810->800 811->798 811->809 812->811 818 6ee804a-6ee807f 817->818 819 6ee7e39-6ee7e56 817->819 823 6ee8081-6ee8084 818->823 829 6ee802c-6ee8039 819->829 830 6ee7e5c-6ee7e84 819->830 825 6ee8086-6ee80a2 823->825 826 6ee80a7-6ee80aa 823->826 825->826 827 6ee82df-6ee82e2 826->827 828 6ee80b0-6ee80bf 826->828 831 6ee838d-6ee838f 827->831 832 6ee82e8-6ee82f4 827->832 838 6ee80de-6ee8122 828->838 839 6ee80c1-6ee80dc 828->839 829->816 829->817 830->829 852 6ee7e8a-6ee7e93 830->852 835 6ee8396-6ee8399 831->835 836 6ee8391 831->836 840 6ee82ff-6ee8301 832->840 835->823 841 6ee839f-6ee83a8 835->841 836->835 854 6ee8128-6ee8139 838->854 855 6ee82b3-6ee82c9 838->855 839->838 843 6ee8319-6ee831d 840->843 844 6ee8303-6ee8309 840->844 850 6ee831f-6ee8329 843->850 851 6ee832b 843->851 848 6ee830d-6ee830f 844->848 849 6ee830b 844->849 848->843 849->843 853 6ee8330-6ee8332 850->853 851->853 852->818 856 6ee7e99-6ee7eb5 852->856 858 6ee8334-6ee8337 853->858 859 6ee8343-6ee837c 853->859 866 6ee829e-6ee82ad 854->866 867 6ee813f-6ee815c 854->867 855->827 863 6ee801a-6ee8026 856->863 864 6ee7ebb-6ee7ee5 856->864 858->841 859->828 880 6ee8382-6ee838c 859->880 863->829 863->852 881 6ee7eeb-6ee7f13 864->881 882 6ee8010-6ee8015 864->882 866->854 866->855 867->866 876 6ee8162-6ee8258 call 6ee6590 867->876 930 6ee825a-6ee8264 876->930 931 6ee8266 876->931 881->882 888 6ee7f19-6ee7f47 881->888 882->863 888->882 893 6ee7f4d-6ee7f56 888->893 893->882 895 6ee7f5c-6ee7f8e 893->895 903 6ee7f99-6ee7fb5 895->903 904 6ee7f90-6ee7f94 895->904 903->863 906 6ee7fb7-6ee800e call 6ee6590 903->906 904->882 905 6ee7f96 904->905 905->903 906->863 932 6ee826b-6ee826d 930->932 931->932 932->866 933 6ee826f-6ee8274 932->933 934 6ee8276-6ee8280 933->934 935 6ee8282 933->935 936 6ee8287-6ee8289 934->936 935->936 936->866 937 6ee828b-6ee8297 936->937 937->866
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq
                                                              • API String ID: 0-2246304398
                                                              • Opcode ID: 33aaea5280ddb6d0bdffd3b0050b87b70fca59ff5654d05324407b6f0055f41e
                                                              • Instruction ID: 0de6c2a7dc0b6117590a226070a12cbdc39c8685960c4934cccb4f11fda17cb4
                                                              • Opcode Fuzzy Hash: 33aaea5280ddb6d0bdffd3b0050b87b70fca59ff5654d05324407b6f0055f41e
                                                              • Instruction Fuzzy Hash: B702AE30B017068FDB54DB68E954AAEB7E2FF84314F148969D805DB395EB35EC82CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2fa919ad0d30615251403fda6edaf29338e79daca79aab59880be9f5cd8159a1
                                                              • Instruction ID: 823a212ceb0e22cad4415d79367e9865f4721b08e20e98e60b88004a4451f3aa
                                                              • Opcode Fuzzy Hash: 2fa919ad0d30615251403fda6edaf29338e79daca79aab59880be9f5cd8159a1
                                                              • Instruction Fuzzy Hash: EB922334E003048FDB64CF68C588A5DBBB6FF49318F5498A9D50AAB365DB35ED85CB80
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 21e076954c2a1a4b6e1a87eea042eb51a876dfc28b8d8a3f97767b66ee1195dc
                                                              • Instruction ID: 64a7fcf01ab94154856a44dfd4773662b4374234d04dc6ec445954ca890c921a
                                                              • Opcode Fuzzy Hash: 21e076954c2a1a4b6e1a87eea042eb51a876dfc28b8d8a3f97767b66ee1195dc
                                                              • Instruction Fuzzy Hash: 50625A34F002058FDB54DB68D594AADB7F2EF88314F249469E80ADB395EB35ED81CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1347a3939598307462d39641a21092303e0b3a4825562bc123666062abf536d0
                                                              • Instruction ID: 408595a44580ca3b8a530d06d838b16787ffec89f5ed9c0d6552e6eb2cd37a0c
                                                              • Opcode Fuzzy Hash: 1347a3939598307462d39641a21092303e0b3a4825562bc123666062abf536d0
                                                              • Instruction Fuzzy Hash: 4E22CF75F003058FDF64CBA8C5806AEBBB2EF85318F248469D416AB395DB36DC45CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 202b0866eeda835f7ab6bd093ec2c3335d3ff83ffd7b5a73274d839b052e88c8
                                                              • Instruction ID: 2faccb709e556d0562578c1c1e92fa1c0db222b01d629665390ddce018805c9f
                                                              • Opcode Fuzzy Hash: 202b0866eeda835f7ab6bd093ec2c3335d3ff83ffd7b5a73274d839b052e88c8
                                                              • Instruction Fuzzy Hash: 0D227F70F1020A8FDFA4CB6CD684BAEB7B2EB85314F609526E405DB395DB35DC818B91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 6eeacb8-6eeacd6 1 6eeacd8-6eeacdb 0->1 2 6eeacdd-6eeace2 1->2 3 6eeace5-6eeace8 1->3 2->3 4 6eeacea-6eead06 3->4 5 6eead0b-6eead0e 3->5 4->5 6 6eead1f-6eead22 5->6 7 6eead10-6eead14 5->7 10 6eead3c-6eead3f 6->10 11 6eead24-6eead37 6->11 8 6eead1a 7->8 9 6eeaee4-6eeaeee 7->9 8->6 13 6eead4f-6eead52 10->13 14 6eead41-6eead4a 10->14 11->10 16 6eead58-6eead5b 13->16 17 6eeaed5-6eeaede 13->17 14->13 19 6eead5d-6eead66 16->19 20 6eead75-6eead78 16->20 17->9 17->19 21 6eeaeef-6eeaf26 19->21 22 6eead6c-6eead70 19->22 23 6eead8c-6eead8e 20->23 24 6eead7a-6eead87 20->24 31 6eeaf28-6eeaf2b 21->31 22->20 25 6eead95-6eead98 23->25 26 6eead90 23->26 24->23 25->1 29 6eead9e-6eeadc2 25->29 26->25 39 6eeadc8-6eeadd7 29->39 40 6eeaed2 29->40 33 6eeb194-6eeb197 31->33 34 6eeaf31-6eeaf6c 31->34 35 6eeb199 call 6eeb20f 33->35 36 6eeb1a6-6eeb1a9 33->36 44 6eeb15f-6eeb172 34->44 45 6eeaf72-6eeaf7e 34->45 43 6eeb19f-6eeb1a1 35->43 41 6eeb1ba-6eeb1bd 36->41 42 6eeb1ab-6eeb1af 36->42 56 6eeadef-6eeae2a call 6ee6590 39->56 57 6eeadd9-6eeaddf 39->57 40->17 47 6eeb1bf-6eeb1c9 41->47 48 6eeb1ca-6eeb1cd 41->48 42->34 46 6eeb1b5 42->46 43->36 49 6eeb174 44->49 60 6eeaf9e-6eeafe2 45->60 61 6eeaf80-6eeaf99 45->61 46->41 51 6eeb1cf-6eeb1eb 48->51 52 6eeb1f0-6eeb1f2 48->52 59 6eeb175 49->59 51->52 53 6eeb1f9-6eeb1fc 52->53 54 6eeb1f4 52->54 53->31 64 6eeb202-6eeb20c 53->64 54->53 77 6eeae2c-6eeae32 56->77 78 6eeae42-6eeae59 56->78 62 6eeade3-6eeade5 57->62 63 6eeade1 57->63 59->59 79 6eeaffe-6eeb03d 60->79 80 6eeafe4-6eeaff6 60->80 61->49 62->56 63->56 81 6eeae36-6eeae38 77->81 82 6eeae34 77->82 89 6eeae5b-6eeae61 78->89 90 6eeae71-6eeae82 78->90 86 6eeb124-6eeb139 79->86 87 6eeb043-6eeb11e call 6ee6590 79->87 80->79 81->78 82->78 86->44 87->86 93 6eeae65-6eeae67 89->93 94 6eeae63 89->94 98 6eeae9a-6eeaecb 90->98 99 6eeae84-6eeae8a 90->99 93->90 94->90 98->40 101 6eeae8e-6eeae90 99->101 102 6eeae8c 99->102 101->98 102->98
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-1110479544
                                                              • Opcode ID: 1d7e1272b18eebcde63ba9ec662ec187e398c141ceb14b84808c70a83078c844
                                                              • Instruction ID: 6bb0aa70bdb346e9b777721b36c13ac26a5c249a2e1b0d26d33ecd9dc3b3f0a6
                                                              • Opcode Fuzzy Hash: 1d7e1272b18eebcde63ba9ec662ec187e398c141ceb14b84808c70a83078c844
                                                              • Instruction Fuzzy Hash: 23E16D30F1030A8FDB65DBA8D5906AEB7B2FF85304F609529E405DB355DB349C86CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 254 6eeb630-6eeb650 255 6eeb652-6eeb655 254->255 256 6eeb66f-6eeb672 255->256 257 6eeb657-6eeb65e 255->257 260 6eeb674-6eeb67d 256->260 261 6eeb682-6eeb685 256->261 258 6eeb664-6eeb66a 257->258 259 6eeb9d3-6eeba0e 257->259 258->256 269 6eeba10-6eeba13 259->269 260->261 262 6eeb68c-6eeb68f 261->262 263 6eeb687-6eeb689 261->263 264 6eeb69c-6eeb69f 262->264 265 6eeb691-6eeb697 262->265 263->262 267 6eeb6a5-6eeb6a8 264->267 268 6eeb770-6eeb771 264->268 265->264 270 6eeb6aa-6eeb6b3 267->270 271 6eeb6c5-6eeb6c8 267->271 274 6eeb776-6eeb779 268->274 272 6eebc7f-6eebc82 269->272 273 6eeba19-6eeba41 269->273 270->259 277 6eeb6b9-6eeb6c0 270->277 280 6eeb6ca-6eeb6d3 271->280 281 6eeb6d8-6eeb6db 271->281 278 6eebc84-6eebca0 272->278 279 6eebca5-6eebca7 272->279 330 6eeba4b-6eeba8f 273->330 331 6eeba43-6eeba46 273->331 275 6eeb7ce-6eeb7d1 274->275 276 6eeb77b-6eeb7c9 call 6ee6590 274->276 282 6eeb7d3-6eeb7e8 275->282 283 6eeb810-6eeb813 275->283 276->275 277->271 278->279 287 6eebcae-6eebcb1 279->287 288 6eebca9 279->288 280->281 285 6eeb6dd-6eeb6e6 281->285 286 6eeb6eb-6eeb6ee 281->286 282->259 307 6eeb7ee-6eeb80b 282->307 290 6eeb815-6eeb82a 283->290 291 6eeb852-6eeb855 283->291 285->286 293 6eeb708-6eeb70b 286->293 294 6eeb6f0-6eeb6f6 286->294 287->269 295 6eebcb7-6eebcc0 287->295 288->287 290->259 318 6eeb830-6eeb84d 290->318 300 6eeb87f-6eeb882 291->300 301 6eeb857-6eeb85e 291->301 302 6eeb70d-6eeb713 293->302 303 6eeb71a-6eeb71d 293->303 294->259 299 6eeb6fc-6eeb703 294->299 299->293 309 6eeb884-6eeb8a0 300->309 310 6eeb8a5-6eeb8a8 300->310 301->259 313 6eeb864-6eeb874 301->313 302->294 304 6eeb715 302->304 305 6eeb72f-6eeb732 303->305 306 6eeb71f-6eeb72a 303->306 304->303 314 6eeb749-6eeb74c 305->314 315 6eeb734-6eeb73b 305->315 306->305 307->283 309->310 316 6eeb8ca-6eeb8cd 310->316 317 6eeb8aa-6eeb8c5 310->317 337 6eeb87a 313->337 338 6eeb947-6eeb94e 313->338 328 6eeb74e-6eeb753 314->328 329 6eeb756-6eeb759 314->329 315->259 327 6eeb741-6eeb744 315->327 320 6eeb8cf-6eeb8d2 316->320 321 6eeb8d7-6eeb8da 316->321 317->316 318->291 320->321 332 6eeb92e-6eeb937 321->332 333 6eeb8dc-6eeb8df 321->333 327->314 328->329 334 6eeb75b-6eeb761 329->334 335 6eeb766-6eeb769 329->335 367 6eebc74-6eebc7e 330->367 368 6eeba95-6eeba9e 330->368 331->295 332->270 346 6eeb93d 332->346 342 6eeb8f0-6eeb8f3 333->342 343 6eeb8e1-6eeb8e5 333->343 334->335 335->302 347 6eeb76b-6eeb76e 335->347 337->300 338->259 340 6eeb954-6eeb964 338->340 340->268 360 6eeb96a 340->360 349 6eeb8f5-6eeb8fe 342->349 350 6eeb903-6eeb906 342->350 343->285 348 6eeb8eb 343->348 351 6eeb942-6eeb945 346->351 347->268 347->274 348->342 349->350 350->268 355 6eeb90c-6eeb90f 350->355 351->338 357 6eeb96f-6eeb972 351->357 358 6eeb929-6eeb92c 355->358 359 6eeb911-6eeb918 355->359 361 6eeb984-6eeb987 357->361 362 6eeb974 357->362 358->332 358->351 359->259 365 6eeb91e-6eeb924 359->365 360->357 361->268 364 6eeb98d-6eeb990 361->364 369 6eeb97c-6eeb97f 362->369 370 6eeb9b6-6eeb9b8 364->370 371 6eeb992-6eeb999 364->371 365->358 374 6eebc6a-6eebc6f 368->374 375 6eebaa4-6eebb10 call 6ee6590 368->375 369->361 372 6eeb9bf-6eeb9c2 370->372 373 6eeb9ba 370->373 371->259 376 6eeb99b-6eeb9ab 371->376 372->255 378 6eeb9c8-6eeb9d2 372->378 373->372 374->367 388 6eebc0a-6eebc1f 375->388 389 6eebb16-6eebb1b 375->389 376->301 382 6eeb9b1 376->382 382->370 388->374 390 6eebb1d-6eebb23 389->390 391 6eebb37 389->391 393 6eebb29-6eebb2b 390->393 394 6eebb25-6eebb27 390->394 395 6eebb39-6eebb3f 391->395 396 6eebb35 393->396 394->396 397 6eebb54-6eebb61 395->397 398 6eebb41-6eebb47 395->398 396->395 405 6eebb79-6eebb86 397->405 406 6eebb63-6eebb69 397->406 399 6eebb4d 398->399 400 6eebbf5-6eebc04 398->400 399->397 401 6eebbbc-6eebbc9 399->401 402 6eebb88-6eebb95 399->402 400->388 400->389 411 6eebbcb-6eebbd1 401->411 412 6eebbe1-6eebbee 401->412 414 6eebbad-6eebbba 402->414 415 6eebb97-6eebb9d 402->415 405->400 407 6eebb6d-6eebb6f 406->407 408 6eebb6b 406->408 407->405 408->405 416 6eebbd5-6eebbd7 411->416 417 6eebbd3 411->417 412->400 414->400 418 6eebb9f 415->418 419 6eebba1-6eebba3 415->419 416->412 417->412 418->414 419->414
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-220072568
                                                              • Opcode ID: 63be8afb5ad8ee656a7504ee12f26ae4ee74425c99054f7c0f0665c3e81ba88d
                                                              • Instruction ID: 373e27af5beb74125de37ff3c2a5f2154f63ca603c03cc415cca0087c7ca1cb2
                                                              • Opcode Fuzzy Hash: 63be8afb5ad8ee656a7504ee12f26ae4ee74425c99054f7c0f0665c3e81ba88d
                                                              • Instruction Fuzzy Hash: F5027D30F1030A8FDBA4CF68D6846AEB7B2FB85314F20956AE405DB295DB35DC81CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 422 6ee9138-6ee915d 423 6ee915f-6ee9162 422->423 424 6ee9168-6ee917d 423->424 425 6ee9a20-6ee9a23 423->425 432 6ee917f-6ee9185 424->432 433 6ee9195-6ee91ab 424->433 426 6ee9a49-6ee9a4b 425->426 427 6ee9a25-6ee9a44 425->427 429 6ee9a4d 426->429 430 6ee9a52-6ee9a55 426->430 427->426 429->430 430->423 434 6ee9a5b-6ee9a65 430->434 435 6ee9189-6ee918b 432->435 436 6ee9187 432->436 439 6ee91b6-6ee91b8 433->439 435->433 436->433 440 6ee91ba-6ee91c0 439->440 441 6ee91d0-6ee9241 439->441 442 6ee91c4-6ee91c6 440->442 443 6ee91c2 440->443 452 6ee926d-6ee9289 441->452 453 6ee9243-6ee9266 441->453 442->441 443->441 458 6ee928b-6ee92ae 452->458 459 6ee92b5-6ee92d0 452->459 453->452 458->459 464 6ee92fb-6ee9316 459->464 465 6ee92d2-6ee92f4 459->465 470 6ee933b-6ee9349 464->470 471 6ee9318-6ee9334 464->471 465->464 472 6ee934b-6ee9354 470->472 473 6ee9359-6ee93d3 470->473 471->470 472->434 479 6ee93d5-6ee93f3 473->479 480 6ee9420-6ee9435 473->480 484 6ee940f-6ee941e 479->484 485 6ee93f5-6ee9404 479->485 480->425 484->479 484->480 485->484
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq
                                                              • API String ID: 0-812946093
                                                              • Opcode ID: d066a51af0a17a7289d47f51fed77a7c0edb94b7557acc2a14cd7f88687baa39
                                                              • Instruction ID: 3f73d4d52966f658f027a9b74285e93fea14e4057fea1c9ed987195703f5a651
                                                              • Opcode Fuzzy Hash: d066a51af0a17a7289d47f51fed77a7c0edb94b7557acc2a14cd7f88687baa39
                                                              • Instruction Fuzzy Hash: D8915270F0060A8FDB54DF68E9947AEB7F6EF84200F109469C509EB399EB349C818B91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 488 6eecf28-6eecf43 489 6eecf45-6eecf48 488->489 490 6eecf4a-6eecf8c 489->490 491 6eecf91-6eecf94 489->491 490->491 492 6eecf9a-6eecf9d 491->492 493 6eed414-6eed420 491->493 496 6eecf9f-6eecfae 492->496 497 6eecfe6-6eecfe9 492->497 494 6eed426-6eed713 493->494 495 6eed122-6eed131 493->495 701 6eed93a-6eed944 494->701 702 6eed719-6eed71f 494->702 499 6eed133-6eed138 495->499 500 6eed140-6eed14c 495->500 501 6eecfbd-6eecfc9 496->501 502 6eecfb0-6eecfb5 496->502 503 6eecfeb-6eed02d 497->503 504 6eed032-6eed035 497->504 499->500 505 6eed945-6eed97e 500->505 506 6eed152-6eed164 500->506 501->505 508 6eecfcf-6eecfe1 501->508 502->501 503->504 509 6eed07e-6eed081 504->509 510 6eed037-6eed079 504->510 524 6eed980-6eed983 505->524 525 6eed169-6eed16c 506->525 508->497 512 6eed0a4-6eed0a7 509->512 513 6eed083-6eed09f 509->513 510->509 518 6eed0a9-6eed0eb 512->518 519 6eed0f0-6eed0f3 512->519 513->512 518->519 527 6eed0fd-6eed100 519->527 528 6eed0f5-6eed0fa 519->528 530 6eed9a6-6eed9a9 524->530 531 6eed985-6eed9a1 524->531 532 6eed16e-6eed170 525->532 533 6eed17b-6eed17e 525->533 534 6eed11d-6eed120 527->534 535 6eed102-6eed118 527->535 528->527 545 6eed9ab call 6eeda9d 530->545 546 6eed9b8-6eed9bb 530->546 531->530 540 6eed176 532->540 541 6eed411 532->541 543 6eed1c7-6eed1ca 533->543 544 6eed180-6eed1c2 533->544 534->495 534->525 535->534 540->533 541->493 547 6eed1cc-6eed20e 543->547 548 6eed213-6eed216 543->548 544->543 558 6eed9b1-6eed9b3 545->558 552 6eed9ee-6eed9f0 546->552 553 6eed9bd-6eed9e9 546->553 547->548 561 6eed218-6eed21a 548->561 562 6eed225-6eed228 548->562 559 6eed9f7-6eed9fa 552->559 560 6eed9f2 552->560 553->552 558->546 559->524 570 6eed9fc-6eeda0b 559->570 560->559 571 6eed2cf-6eed2d8 561->571 572 6eed220 561->572 573 6eed22a-6eed26c 562->573 574 6eed271-6eed274 562->574 593 6eeda0d-6eeda70 call 6ee6590 570->593 594 6eeda72-6eeda87 570->594 578 6eed2da-6eed2df 571->578 579 6eed2e7-6eed2f3 571->579 572->562 573->574 575 6eed2bd-6eed2bf 574->575 576 6eed276-6eed2b8 574->576 583 6eed2c6-6eed2c9 575->583 584 6eed2c1 575->584 576->575 578->579 586 6eed2f9-6eed30d 579->586 587 6eed404-6eed409 579->587 583->489 583->571 584->583 586->541 604 6eed313-6eed325 586->604 587->541 593->594 606 6eeda88 594->606 617 6eed349-6eed34b 604->617 618 6eed327-6eed32d 604->618 606->606 624 6eed355-6eed361 617->624 621 6eed32f 618->621 622 6eed331-6eed33d 618->622 626 6eed33f-6eed347 621->626 622->626 635 6eed36f 624->635 636 6eed363-6eed36d 624->636 626->624 637 6eed374-6eed376 635->637 636->637 637->541 640 6eed37c-6eed398 call 6ee6590 637->640 649 6eed39a-6eed39f 640->649 650 6eed3a7-6eed3b3 640->650 649->650 650->587 651 6eed3b5-6eed402 650->651 651->541 703 6eed72e-6eed737 702->703 704 6eed721-6eed726 702->704 703->505 705 6eed73d-6eed750 703->705 704->703 707 6eed92a-6eed934 705->707 708 6eed756-6eed75c 705->708 707->701 707->702 709 6eed75e-6eed763 708->709 710 6eed76b-6eed774 708->710 709->710 710->505 711 6eed77a-6eed79b 710->711 714 6eed79d-6eed7a2 711->714 715 6eed7aa-6eed7b3 711->715 714->715 715->505 716 6eed7b9-6eed7d6 715->716 716->707 719 6eed7dc-6eed7e2 716->719 719->505 720 6eed7e8-6eed801 719->720 722 6eed91d-6eed924 720->722 723 6eed807-6eed82e 720->723 722->707 722->719 723->505 726 6eed834-6eed83e 723->726 726->505 727 6eed844-6eed85b 726->727 729 6eed85d-6eed868 727->729 730 6eed86a-6eed885 727->730 729->730 730->722 735 6eed88b-6eed8a4 call 6ee6590 730->735 739 6eed8a6-6eed8ab 735->739 740 6eed8b3-6eed8bc 735->740 739->740 740->505 741 6eed8c2-6eed916 740->741 741->722
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq
                                                              • API String ID: 0-177832560
                                                              • Opcode ID: f2cd08916204393c9042166c8a7bd2cccb2a9918fd18072cbf7e90f04aec4a20
                                                              • Instruction ID: b166ab1402d9d3ba68ea4fd5e57777b9e4610f8ce0fd250ad1f177d2c35d1a81
                                                              • Opcode Fuzzy Hash: f2cd08916204393c9042166c8a7bd2cccb2a9918fd18072cbf7e90f04aec4a20
                                                              • Instruction Fuzzy Hash: C1626E70B007168FCB55DB68E994A5EB7F2FF85304B608A68D0059F365EB75EC86CB80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 749 6ee4b50-6ee4b74 751 6ee4b76-6ee4b79 749->751 752 6ee4b7f-6ee4c77 751->752 753 6ee5258-6ee525b 751->753 773 6ee4c7d-6ee4cca call 6ee53f8 752->773 774 6ee4cfa-6ee4d01 752->774 754 6ee527c-6ee527e 753->754 755 6ee525d-6ee5277 753->755 756 6ee5285-6ee5288 754->756 757 6ee5280 754->757 755->754 756->751 759 6ee528e-6ee529b 756->759 757->756 787 6ee4cd0-6ee4cec 773->787 775 6ee4d07-6ee4d77 774->775 776 6ee4d85-6ee4d8e 774->776 793 6ee4d79 775->793 794 6ee4d82 775->794 776->759 791 6ee4cee 787->791 792 6ee4cf7-6ee4cf8 787->792 791->792 792->774 793->794 794->776
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: fjq$XPjq$\Ojq
                                                              • API String ID: 0-216941231
                                                              • Opcode ID: 026ed0d010ede8ed04a41a85f5bb26a99c1d3000df94354bd29d1fb5f431ce2b
                                                              • Instruction ID: fa890fd19017fba2a3b04be84ec190b1f000a710aac2bb0e7dc8742d99a0e9ab
                                                              • Opcode Fuzzy Hash: 026ed0d010ede8ed04a41a85f5bb26a99c1d3000df94354bd29d1fb5f431ce2b
                                                              • Instruction Fuzzy Hash: CE615F70F002199FEB549BA9C8147AEBBF6FF88340F20842AD506EB395DB758D458B91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1613 6ee9127-6ee915d 1615 6ee915f-6ee9162 1613->1615 1616 6ee9168-6ee917d 1615->1616 1617 6ee9a20-6ee9a23 1615->1617 1624 6ee917f-6ee9185 1616->1624 1625 6ee9195-6ee91ab 1616->1625 1618 6ee9a49-6ee9a4b 1617->1618 1619 6ee9a25-6ee9a44 1617->1619 1621 6ee9a4d 1618->1621 1622 6ee9a52-6ee9a55 1618->1622 1619->1618 1621->1622 1622->1615 1626 6ee9a5b-6ee9a65 1622->1626 1627 6ee9189-6ee918b 1624->1627 1628 6ee9187 1624->1628 1631 6ee91b6-6ee91b8 1625->1631 1627->1625 1628->1625 1632 6ee91ba-6ee91c0 1631->1632 1633 6ee91d0-6ee9241 1631->1633 1634 6ee91c4-6ee91c6 1632->1634 1635 6ee91c2 1632->1635 1644 6ee926d-6ee9289 1633->1644 1645 6ee9243-6ee9266 1633->1645 1634->1633 1635->1633 1650 6ee928b-6ee92ae 1644->1650 1651 6ee92b5-6ee92d0 1644->1651 1645->1644 1650->1651 1656 6ee92fb-6ee9316 1651->1656 1657 6ee92d2-6ee92f4 1651->1657 1662 6ee933b-6ee9349 1656->1662 1663 6ee9318-6ee9334 1656->1663 1657->1656 1664 6ee934b-6ee9354 1662->1664 1665 6ee9359-6ee93d3 1662->1665 1663->1662 1664->1626 1671 6ee93d5-6ee93f3 1665->1671 1672 6ee9420-6ee9435 1665->1672 1676 6ee940f-6ee941e 1671->1676 1677 6ee93f5-6ee9404 1671->1677 1672->1617 1676->1671 1676->1672 1677->1676
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq
                                                              • API String ID: 0-2246304398
                                                              • Opcode ID: 5ae22ea0b6a5693ba9aa13804ea9b77fdc5700ddb8e7d7375bfd1b93dea9dcdb
                                                              • Instruction ID: 32196e94086eb928625953095fc013f2bc719a67e6c5e71d7bd03a0cc933c91f
                                                              • Opcode Fuzzy Hash: 5ae22ea0b6a5693ba9aa13804ea9b77fdc5700ddb8e7d7375bfd1b93dea9dcdb
                                                              • Instruction Fuzzy Hash: 3A516270F006069FDB54DB78E994BAE73F6EF88200F108469D909DB399EE34AC41CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2136 192eb38-192eb40 2137 192eb42-192eb53 2136->2137 2138 192eaff-192eb18 call 192eb38 2136->2138 2140 192eb55-192eb7c 2137->2140 2141 192eb7d-192eb93 2137->2141 2143 192eb1e-192eb22 2138->2143 2166 192eb95 call 192ec20 2141->2166 2167 192eb95 call 192eb38 2141->2167 2145 192eb24-192eb29 2143->2145 2146 192eb2b-192eb2e 2143->2146 2147 192eb31-192eb33 2145->2147 2146->2147 2148 192eb9a-192eb9c 2149 192eba2-192ec01 2148->2149 2150 192eb9e-192eba1 2148->2150 2157 192ec03-192ec06 2149->2157 2158 192ec07-192ec94 GlobalMemoryStatusEx 2149->2158 2162 192ec96-192ec9c 2158->2162 2163 192ec9d-192ecc5 2158->2163 2162->2163 2166->2148 2167->2148
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3356756424.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_1920000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2de59ba93e76da9334e548364b6fe3974e529628d995e8026c6ece6548c11665
                                                              • Instruction ID: 15dc4e7fe61f599bc09be742eabe6d578aa7ebe61810cbd1f78ac68546a94ecd
                                                              • Opcode Fuzzy Hash: 2de59ba93e76da9334e548364b6fe3974e529628d995e8026c6ece6548c11665
                                                              • Instruction Fuzzy Hash: A5514772D043999FCB14DF7AD8446DEBFF5EF8A210F04856AD40AE7241DB389845CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2169 192ec20-192ec94 GlobalMemoryStatusEx 2171 192ec96-192ec9c 2169->2171 2172 192ec9d-192ecc5 2169->2172 2171->2172
                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 0192EC87
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3356756424.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_1920000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID:
                                                              • API String ID: 1890195054-0
                                                              • Opcode ID: b2bfcaba153ad0760097b9c4b182dc6699f86408bbedf1dafacd57ffb6c6dc89
                                                              • Instruction ID: 3c9f675c01b4063297dc9fa3855ae1ba938556ca000f9f0fcd7384b84cb83265
                                                              • Opcode Fuzzy Hash: b2bfcaba153ad0760097b9c4b182dc6699f86408bbedf1dafacd57ffb6c6dc89
                                                              • Instruction Fuzzy Hash: C311F3B1C006699BDB10CF9AC944BDEFBF8EF48320F14816AD918B7241D779A944CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2175 6ee4b40-6ee4b48 2176 6ee4b4a-6ee4b64 2175->2176 2177 6ee4b65-6ee4b74 2175->2177 2176->2177 2178 6ee4b76-6ee4b79 2177->2178 2180 6ee4b7f-6ee4c77 2178->2180 2181 6ee5258-6ee525b 2178->2181 2201 6ee4c7d-6ee4cca call 6ee53f8 2180->2201 2202 6ee4cfa-6ee4d01 2180->2202 2182 6ee527c-6ee527e 2181->2182 2183 6ee525d-6ee5277 2181->2183 2184 6ee5285-6ee5288 2182->2184 2185 6ee5280 2182->2185 2183->2182 2184->2178 2187 6ee528e-6ee529b 2184->2187 2185->2184 2215 6ee4cd0-6ee4cec 2201->2215 2203 6ee4d07-6ee4d77 2202->2203 2204 6ee4d85-6ee4d8e 2202->2204 2221 6ee4d79 2203->2221 2222 6ee4d82 2203->2222 2204->2187 2219 6ee4cee 2215->2219 2220 6ee4cf7-6ee4cf8 2215->2220 2219->2220 2220->2202 2221->2222 2222->2204
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: XPjq
                                                              • API String ID: 0-4216394854
                                                              • Opcode ID: 6ea9e26e4600acac17a082ec49206b93e838be20ea39e663d8a8cf66c3975484
                                                              • Instruction ID: 84ee70f914c214b1b49ab0c28e38dc6c05c375bebcede77f76a93159a4a8f771
                                                              • Opcode Fuzzy Hash: 6ea9e26e4600acac17a082ec49206b93e838be20ea39e663d8a8cf66c3975484
                                                              • Instruction Fuzzy Hash: 50416070F002199FDB559FA9C814BAEBBF6FF88300F20852AD506AB395DB759C05CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2225 6eeda9d-6eedac7 2226 6eedac9-6eedacc 2225->2226 2227 6eedace-6eedaea 2226->2227 2228 6eedaef-6eedaf2 2226->2228 2227->2228 2229 6eedaf4-6eedb20 2228->2229 2230 6eedb25-6eedb28 2228->2230 2229->2230 2232 6eedb2a 2230->2232 2233 6eedb37-6eedb39 2230->2233 2237 6eedb30-6eedb32 2232->2237 2234 6eedb3b 2233->2234 2235 6eedb40-6eedb43 2233->2235 2234->2235 2235->2226 2238 6eedb45-6eedb54 2235->2238 2237->2233 2240 6eedb5a-6eedb93 2238->2240 2241 6eedcd9-6eedd03 2238->2241 2248 6eedb95-6eedb9f 2240->2248 2249 6eedbe1-6eedc05 2240->2249 2244 6eedd04 2241->2244 2244->2244 2253 6eedbb7-6eedbdf 2248->2253 2254 6eedba1-6eedba7 2248->2254 2255 6eedc0f-6eedcd3 2249->2255 2256 6eedc07 2249->2256 2253->2248 2253->2249 2257 6eedbab-6eedbad 2254->2257 2258 6eedba9 2254->2258 2255->2240 2255->2241 2256->2255 2257->2253 2258->2253
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHeq
                                                              • API String ID: 0-2873676430
                                                              • Opcode ID: 42ba4a8c44827c99543242c7d6a7152fea5e9f1d6cc180c4d5f19d1082ce7098
                                                              • Instruction ID: 1d904424635c2cdd1b1c8530c24f3706b93a3e1e192b815bf9e2201418940188
                                                              • Opcode Fuzzy Hash: 42ba4a8c44827c99543242c7d6a7152fea5e9f1d6cc180c4d5f19d1082ce7098
                                                              • Instruction Fuzzy Hash: 9A41B270E003099FDB61DF65D8446AEBBB6FF85344F245529E806DB244EB709946CB81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2264 6ee21d0-6ee21eb 2265 6ee21ed-6ee21f0 2264->2265 2266 6ee21f2-6ee220e 2265->2266 2267 6ee2213-6ee2215 2265->2267 2266->2267 2268 6ee221c-6ee221f 2267->2268 2269 6ee2217 2267->2269 2268->2265 2271 6ee2221-6ee2247 2268->2271 2269->2268 2276 6ee224e-6ee227c 2271->2276 2281 6ee227e-6ee2288 2276->2281 2282 6ee22f3-6ee2317 2276->2282 2285 6ee228a-6ee2290 2281->2285 2286 6ee22a0-6ee22f1 2281->2286 2288 6ee2319 2282->2288 2289 6ee2321 2282->2289 2290 6ee2294-6ee2296 2285->2290 2291 6ee2292 2285->2291 2286->2281 2286->2282 2288->2289 2290->2286 2291->2286
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHeq
                                                              • API String ID: 0-2873676430
                                                              • Opcode ID: e6d7d06e5f0aeff565dc28482308c95f512507095a7baee1accaaeda679a4689
                                                              • Instruction ID: 2b27b0ea4577a5ae60544d166fb9b6405cf9fdfa995f7ec5e6384f17e2cd3736
                                                              • Opcode Fuzzy Hash: e6d7d06e5f0aeff565dc28482308c95f512507095a7baee1accaaeda679a4689
                                                              • Instruction Fuzzy Hash: 1631FC30B102068FDB999F78D51876E3BABEF89204F649428D502DB395EE35CD41CB94
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq
                                                              • API String ID: 0-731066626
                                                              • Opcode ID: 1dec63970f92e64026da3a4da146d29dde7b9e1c69760a9960051fdb0ec8cc05
                                                              • Instruction ID: e04fdff608033cf3b553dc2e7886ea55d0e96fa168aa8af9e4e1b636595851b9
                                                              • Opcode Fuzzy Hash: 1dec63970f92e64026da3a4da146d29dde7b9e1c69760a9960051fdb0ec8cc05
                                                              • Instruction Fuzzy Hash: 76F02236F04301CFEFA88D59F9886BBB3AAEB00219F0421B2CE00C7190D334CE10CAA1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9a0e96b879c2850ebe9f39142f630d8ebde1b456c92b9520189f2a78349ed540
                                                              • Instruction ID: 1bb85e97069b8090687f96fa561cc1295ff74b08b0c4ef9f726a462b4d5766de
                                                              • Opcode Fuzzy Hash: 9a0e96b879c2850ebe9f39142f630d8ebde1b456c92b9520189f2a78349ed540
                                                              • Instruction Fuzzy Hash: 9532A074F002058FDB54DB68E984BAEB7F2FB88714F209529E815DB395DB34EC468B90
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 934b3220ce6c82aadbc3332c0713802b791147d921ccd4f2f1b7902df2b4258a
                                                              • Instruction ID: c97a42dbe0e4c4f4d40cf6fda54673d63a6c8b3795e14f583cc9eea3e0ac9684
                                                              • Opcode Fuzzy Hash: 934b3220ce6c82aadbc3332c0713802b791147d921ccd4f2f1b7902df2b4258a
                                                              • Instruction Fuzzy Hash: 6961C071F005124FCF519A6ED88066FBADBAFE4210B254439D80EDB365EE69EC0287D1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f64709ab3e3a69e3142476cdcd98b6acc95a78a6ef66349395b2ec839517613b
                                                              • Instruction ID: d2d8dd638158cbdcfcbefb52cd7f89e3a3e06da05d065ea244eb7198ebe67276
                                                              • Opcode Fuzzy Hash: f64709ab3e3a69e3142476cdcd98b6acc95a78a6ef66349395b2ec839517613b
                                                              • Instruction Fuzzy Hash: A1814A30F006098BDB54DFA9D5547AEB7F6EF89304F108529D40AEB399EB34EC428B91
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2977e92c518a24559ccd0b7a92af9b83d69e755228418a20d8ee29961c6c1408
                                                              • Instruction ID: 8d25787cd5824eeed6f1040134924f37b1125ed278e0caf8d8d700fa937e45c5
                                                              • Opcode Fuzzy Hash: 2977e92c518a24559ccd0b7a92af9b83d69e755228418a20d8ee29961c6c1408
                                                              • Instruction Fuzzy Hash: 80914F74E0071A8BDB60DF68C840B9DB7B1FF89314F208595E449BB295DB70AA85CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1de898370ce0831dcf95ba43134ac9e9d305b516b1a2b66215b64fd4b6a7ed35
                                                              • Instruction ID: 8508d3168829d737e7446bd3053151709610dc39a15e8232f515adc0f5b2b77c
                                                              • Opcode Fuzzy Hash: 1de898370ce0831dcf95ba43134ac9e9d305b516b1a2b66215b64fd4b6a7ed35
                                                              • Instruction Fuzzy Hash: 59915074E0061A8BDF60DF68C880B9DB7B1FF89304F208595D549BB395DB70AA85CF90
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a1ff8409c623b04ea9dd5ddbdf48934a0eacf8ea12c5b7325e13fd5592b4c6bb
                                                              • Instruction ID: 89d665c546280a332cf382c0011cfe3c769d3180d3126cb7e4893bad7689ba88
                                                              • Opcode Fuzzy Hash: a1ff8409c623b04ea9dd5ddbdf48934a0eacf8ea12c5b7325e13fd5592b4c6bb
                                                              • Instruction Fuzzy Hash: CB814B70A006499FDB54DFA8D980A9EBBF6FF88300F249569E409EB355DB34EC46CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2339a412e7eb2097c088114679eb52c2cc9fd0d7d4b23ba69a7604c0cddb75a8
                                                              • Instruction ID: f6bf77973e70c86fd293a06b5bbabdf13015475e8d66dc9fe51067d5ec1db9a8
                                                              • Opcode Fuzzy Hash: 2339a412e7eb2097c088114679eb52c2cc9fd0d7d4b23ba69a7604c0cddb75a8
                                                              • Instruction Fuzzy Hash: F5712A70B006099FDB54DBA8D980A9EBBF6FF88300F249469E409EB355EB34ED45CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9ea683cbad9a17c378b19899d99e77d65a19b4d7f1e9cee19036ad4f28103ac
                                                              • Instruction ID: 43ed959a1165592854adf85b6bc490fa7a0abb8452ac8051d57946e74421b74e
                                                              • Opcode Fuzzy Hash: e9ea683cbad9a17c378b19899d99e77d65a19b4d7f1e9cee19036ad4f28103ac
                                                              • Instruction Fuzzy Hash: 4851E135F00209DFCB64ABB8E4447ADBBB6FB88315F208879E106DB261DB359955CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 63b25c6784d952cf479b3f1e55d7ee1c83c02f2f042e768295a8cefef84d733b
                                                              • Instruction ID: 4a14a9e25122156c3fec16e4aadf771b1fe3e2fca220f634d346bfd9f7b29eae
                                                              • Opcode Fuzzy Hash: 63b25c6784d952cf479b3f1e55d7ee1c83c02f2f042e768295a8cefef84d733b
                                                              • Instruction Fuzzy Hash: F051E974F203158FFF655A6CE89876F365AD7C9710F20452AE50AC73D9CA68CC818792
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 231e7bd2851d59c970100fbd60d0327a613c43bee835c2281e9a64ef74c92833
                                                              • Instruction ID: 07d3ab99977a362e9a738d3a6545c245497edfeb9a9508c3129a7135705b80e7
                                                              • Opcode Fuzzy Hash: 231e7bd2851d59c970100fbd60d0327a613c43bee835c2281e9a64ef74c92833
                                                              • Instruction Fuzzy Hash: 5951F9B4F203158BEF655A6CE89872F365AE7C9714F60453AD50EC73D9CA68CC8183A2
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eebf7411957de602bae2cea5299af52b056fc2eab9bd31c2d268ed4565dc17de
                                                              • Instruction ID: e4358444a6e2a6188f678115c57a3e92376d897209eb0861bee5b061a058d78f
                                                              • Opcode Fuzzy Hash: eebf7411957de602bae2cea5299af52b056fc2eab9bd31c2d268ed4565dc17de
                                                              • Instruction Fuzzy Hash: 7A416071E007099FDF70CEA9D880AAFFBB6FB84318F10492AE116D7650D331E9598B91
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8a224bd7663402801b8f4a504228078055706eafbf4cf73f5f0541487f88520
                                                              • Instruction ID: 742632f32388886d7675757465d40b534e5094ae27077737133c03f68323617a
                                                              • Opcode Fuzzy Hash: d8a224bd7663402801b8f4a504228078055706eafbf4cf73f5f0541487f88520
                                                              • Instruction Fuzzy Hash: 7931C370E1070A8FDB65DF68D89069EBBF6FF85304F104929E405EB250EBB1A942CB80
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3d34396dfdc87bb43e605caaf5e7d99cf00fa54d82d0ad4e6658848fe8465ea
                                                              • Instruction ID: 23c2f2c2ba7231f1937974cef828fafdc7d809128485beec5a497d70edbebe0c
                                                              • Opcode Fuzzy Hash: e3d34396dfdc87bb43e605caaf5e7d99cf00fa54d82d0ad4e6658848fe8465ea
                                                              • Instruction Fuzzy Hash: 27318F31E003059FCB59CFA8D99469EB7B6FF89300F108529EA06E7350EB71AE45CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7aad9e19dee26e1cdbf67532118404e1fa0c6b85ebcb5fab1842f0095db1ad62
                                                              • Instruction ID: ccc42eab181e3e7467d8ad615ead2833da3f5acc4f3b6e2ddcd510914ffbcade
                                                              • Opcode Fuzzy Hash: 7aad9e19dee26e1cdbf67532118404e1fa0c6b85ebcb5fab1842f0095db1ad62
                                                              • Instruction Fuzzy Hash: 1E317E30E103059FCB59CFA5D99469EB7B6FF89300F108529EA06EB350EB71AE45CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 367fdb4e2ba1fcc07ac3991b4014f95dfbd0a4a55d81d4845ab10e11a4acf803
                                                              • Instruction ID: 530cebc90a429e749e3376f50f36da95e74ab9e6e1b95bc3e525af93d20842c3
                                                              • Opcode Fuzzy Hash: 367fdb4e2ba1fcc07ac3991b4014f95dfbd0a4a55d81d4845ab10e11a4acf803
                                                              • Instruction Fuzzy Hash: 11216935F012159FDB50CF69E981AEEBBF5EB48750F108025E909EB355E734DC418BA0
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2dd483a627685e154395120180bf7fbc6ef36faab79a78c21e6eb77c915cdaad
                                                              • Instruction ID: d9de3b61139b364ac1ef3c6885adcfa635b989280df492a847fc757f858fcfdf
                                                              • Opcode Fuzzy Hash: 2dd483a627685e154395120180bf7fbc6ef36faab79a78c21e6eb77c915cdaad
                                                              • Instruction Fuzzy Hash: 9B218975F016159FDB40CFA9E980AAEBBF1FB88750F108029E909EB395E734DD408B90
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3356281008.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_15ed000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5a7933d7144949acf96d146cf646556842cfbd1c143bc0b409af689266d2e8ee
                                                              • Instruction ID: fa7743060edb0c196039e33201b3e36ed62fd0d99eab14d743535788779551de
                                                              • Opcode Fuzzy Hash: 5a7933d7144949acf96d146cf646556842cfbd1c143bc0b409af689266d2e8ee
                                                              • Instruction Fuzzy Hash: 522125B5904200DFCB19DF58D988B26BFF5FB84314F28C96DD8090F286D33AD406CA61
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3356281008.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_15ed000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fc3f0d0a51bdef3c19bb3a16d7065c33e16683e6182bf79d8c93ad42b7bb648b
                                                              • Instruction ID: 94ebe62131718ecfb8e631d0c76c5b2ce6f038fc329cdf69eab789a50aebc822
                                                              • Opcode Fuzzy Hash: fc3f0d0a51bdef3c19bb3a16d7065c33e16683e6182bf79d8c93ad42b7bb648b
                                                              • Instruction Fuzzy Hash: 8221687550D3C08FCB07CF64C994715BFB1AB46214F29C1DBC8898F2A3C23A880ACB62
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6581d68b3f3593bcea355f0970bf2f2bc27161c74b09b727083480086bf16be5
                                                              • Instruction ID: 6417bf6d899e9ae8576dc0282aa2383d38f8f9051a96bef478ed8ad25a1e302f
                                                              • Opcode Fuzzy Hash: 6581d68b3f3593bcea355f0970bf2f2bc27161c74b09b727083480086bf16be5
                                                              • Instruction Fuzzy Hash: 2C11A131F146254FDF949668D814AAE73AAEBC8310F014539D50AEB358EE24DC028BE4
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f690bab9dd72561651596764fa00203f1187cd155bcff6d5f9b812b66326de9a
                                                              • Instruction ID: 6e52ffd037e95b5b64e41c526f97a55187c78c78bc4874fd2fd5c6fac22af438
                                                              • Opcode Fuzzy Hash: f690bab9dd72561651596764fa00203f1187cd155bcff6d5f9b812b66326de9a
                                                              • Instruction Fuzzy Hash: 67012471B042100FCB61D17CE860A2F77EAEBC9714F10852EE40AC7352DA14CC0743D1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 13db7610c0a17a915d2d337665009303841d488f0883d93c109757c0bae7afcb
                                                              • Instruction ID: dd585593ea3336a371a6a20f48a129f83794fc39bb4a3d740a99e9e581babd95
                                                              • Opcode Fuzzy Hash: 13db7610c0a17a915d2d337665009303841d488f0883d93c109757c0bae7afcb
                                                              • Instruction Fuzzy Hash: D921C2B5D01219AFCB10CF9AD885ADEFFB8FB49310F50812AE918A7240C375A954CBA5
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bd89eeccaf270e6e628d5a8c124bad189cb04a31fa1e1bb96cd40c6c969da003
                                                              • Instruction ID: bd8159f2d3ff86453a90fc51c2177ce1a30b5df7562aa0a1938d0b5dcdbe0fa8
                                                              • Opcode Fuzzy Hash: bd89eeccaf270e6e628d5a8c124bad189cb04a31fa1e1bb96cd40c6c969da003
                                                              • Instruction Fuzzy Hash: 9A012430B042115FDBA596BDA81472FB7DADFCA720F10842AE10ACB392D919CC4243D1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 45fe2d45e3ca4e65b4b7a01ec1e69ee2ec22d1c66f5b8f3b8a44a5a3290920cf
                                                              • Instruction ID: 7517ac9ca9471b662c54cb9905f8ac7b8f97d6e71919563ac725790b156ee0de
                                                              • Opcode Fuzzy Hash: 45fe2d45e3ca4e65b4b7a01ec1e69ee2ec22d1c66f5b8f3b8a44a5a3290920cf
                                                              • Instruction Fuzzy Hash: 3D01D470B046100FDBA5967CE964B6EB7E5EB8A754F10887EE00ECB395DA25DC028791
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8a0d346d837c53683b3db2e92645ed7922a39e435df69c1e2b7898bbb2bd48b5
                                                              • Instruction ID: 18e3d0b15b96a00a4bc1649810bec1e126ca19e5c74c079f09673beb56eda9d2
                                                              • Opcode Fuzzy Hash: 8a0d346d837c53683b3db2e92645ed7922a39e435df69c1e2b7898bbb2bd48b5
                                                              • Instruction Fuzzy Hash: BE01F132F146554BDB98DAA9A8146AF77AADBC9610F04003AD50BE7284FF24DC068BA1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ede3d3289f9b942d8774e24722e4273bb3cee562b4017c2c2f16724980f47cf8
                                                              • Instruction ID: 90a10f02ed69c6dec7dcf423f1038cd998e39dfcccc87ac97f1ffa1babc7298c
                                                              • Opcode Fuzzy Hash: ede3d3289f9b942d8774e24722e4273bb3cee562b4017c2c2f16724980f47cf8
                                                              • Instruction Fuzzy Hash: 6511D0B5D00219AFCB10CF9AD884ADEFFB8FB48310F50812AE918A7240C375A944CFA5
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4297f0b2d3aaac81ce8879ebe14106218ecf4192230320498540c91550dd3572
                                                              • Instruction ID: d540f0c83007b69b726a67199db4bf9a76172c1f204763090a7b66997950f656
                                                              • Opcode Fuzzy Hash: 4297f0b2d3aaac81ce8879ebe14106218ecf4192230320498540c91550dd3572
                                                              • Instruction Fuzzy Hash: 8401D131B002114BDBA495ADA45472BF3DAEBC9724F108439E10AC7791DD25DC420391
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6b891ae478e8b1135134c238b5522c71450c56ec43f795be64f03b2d3aceb30c
                                                              • Instruction ID: 11943fb2cf02cc235c8853b171ab9f0f6b0a9ec4ed68066056ed4599059e5ea1
                                                              • Opcode Fuzzy Hash: 6b891ae478e8b1135134c238b5522c71450c56ec43f795be64f03b2d3aceb30c
                                                              • Instruction Fuzzy Hash: 6A01FF72B002150BCB6495BCE86072FA3DAEBC8724F20883DE10EC7341EE25DC020391
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5cd81b2e0c2a6dd8ca8c40e6880b2804acb383ee7b592caba490198545f84a1d
                                                              • Instruction ID: b026bc0255fa41bdad9e8a1278d5faf61c56c8e4872ee6c69a25099d6c99715d
                                                              • Opcode Fuzzy Hash: 5cd81b2e0c2a6dd8ca8c40e6880b2804acb383ee7b592caba490198545f84a1d
                                                              • Instruction Fuzzy Hash: D501AF70B042100BDBA0D67CE468B2EB3DAEB89714F50983DE50EC7394DA25EC018390
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 944dc2fca53e53291beee6e281d9775bcf36178b23ef62646b0ecee8d2aa8210
                                                              • Instruction ID: 261e2dbcde8123ff609efd4aa13ed583734df2caabd90c5295362ecb035e540c
                                                              • Opcode Fuzzy Hash: 944dc2fca53e53291beee6e281d9775bcf36178b23ef62646b0ecee8d2aa8210
                                                              • Instruction Fuzzy Hash: 99E0D871D14349ABDBE0CE70C95475E776EF711258F2058A7D405CB142E237DD028751
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-2049195972
                                                              • Opcode ID: 3ae8067235b1952efe793db4d9a68ebf0b18e52e9a8263cd274506349406d82c
                                                              • Instruction ID: 786e841c72b265e98922ed94c472d6e512e2750da2702df5d15bb4e50befa7f8
                                                              • Opcode Fuzzy Hash: 3ae8067235b1952efe793db4d9a68ebf0b18e52e9a8263cd274506349406d82c
                                                              • Instruction Fuzzy Hash: 1A121B30F0121ACFDF64DF69D954A9EB7B6FF89304F209569D40AAB265DB309D81CB80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-1110479544
                                                              • Opcode ID: 49255c2fffd64837c49acb8c81db735e1e65e436b0f9b5974693629508034ae5
                                                              • Instruction ID: d9eb519a23ad696f4462e8835be7a117469ec3a514819d982500e7dd794b15a2
                                                              • Opcode Fuzzy Hash: 49255c2fffd64837c49acb8c81db735e1e65e436b0f9b5974693629508034ae5
                                                              • Instruction Fuzzy Hash: 80914A70A01309DFEBA4DF68E954BAEBBB2EF84304F10953DE4069B295DB749C41CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .5}q$$eq$$eq$$eq$$eq$$eq$$eq
                                                              • API String ID: 0-1622854337
                                                              • Opcode ID: a73d3fd8b76d5e81c8e9a213188660733854dd07ac1bcd128605c230c2df740f
                                                              • Instruction ID: bd32364f294bd9f6850d51a8df7628e2477fb81c450cde5c3c67f2457d426540
                                                              • Opcode Fuzzy Hash: a73d3fd8b76d5e81c8e9a213188660733854dd07ac1bcd128605c230c2df740f
                                                              • Instruction Fuzzy Hash: 0BF13970B01209CFDB59DFA8D854A6EBBB2FF84304F648569D4059B399DB35EC82CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq
                                                              • API String ID: 0-812946093
                                                              • Opcode ID: c5c52f54e4eb9d09217e83b74d03952b028b93207d476dbd00f97f0722edefae
                                                              • Instruction ID: c21940cddf594a79fe166ec670f418031278c77bf902ef36f36118a7ad116e49
                                                              • Opcode Fuzzy Hash: c5c52f54e4eb9d09217e83b74d03952b028b93207d476dbd00f97f0722edefae
                                                              • Instruction Fuzzy Hash: D8B15870B11219CFDB64DBA8D854AAEB7B2FF94304F249529D40ADB395DB34DC82CB81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LReq$LReq$$eq$$eq
                                                              • API String ID: 0-731573373
                                                              • Opcode ID: a059b85a47406ddbfd73def0b636327b09ec636c6aac377bd34b5653540b211d
                                                              • Instruction ID: 68cc7c29bfebf4a0eb7b004644cd2f4c3a881f88b913b2bfdf34b02121748498
                                                              • Opcode Fuzzy Hash: a059b85a47406ddbfd73def0b636327b09ec636c6aac377bd34b5653540b211d
                                                              • Instruction Fuzzy Hash: 0851C230B00302DFDB94DB68E954A6BB7E6FF88304F149569E406DB3A5DA31EC40CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3368240467.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_6ee0000_PZgxeUcXE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $eq$$eq$$eq$$eq
                                                              • API String ID: 0-812946093
                                                              • Opcode ID: 949c332e20ce5c7285d77b227fcbdb00481e3064a8de534c1030b6389bec6491
                                                              • Instruction ID: 186133c6793adfb7a5f1ddb0d4cf0ca469a2c45853b153fc8758f688f5f37919
                                                              • Opcode Fuzzy Hash: 949c332e20ce5c7285d77b227fcbdb00481e3064a8de534c1030b6389bec6491
                                                              • Instruction Fuzzy Hash: 67518D34F113058FDBA5DA68E4806AEB7B2FB88304F24957EE8059B354DB35DC81CB91