Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
980001672 PPR for 30887217.scr.exe

Overview

General Information

Sample name:980001672 PPR for 30887217.scr.exe
Analysis ID:1570147
MD5:c2ed28c5339e0b3a5b676b45ad6d978b
SHA1:6c25dc91c3e5e230645f83d49edaa5e1f909393f
SHA256:76144b7c900168c9893aaa223a1ec8e8081cd827c99eadd3a6695efd0ad337dd
Tags:exePaymentscruser-cocaman
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 980001672 PPR for 30887217.scr.exe (PID: 6812 cmdline: "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe" MD5: C2ED28C5339E0B3A5B676B45AD6D978B)
    • powershell.exe (PID: 5800 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2940 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1916 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 3456 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • PpIvKmzUbDB.exe (PID: 1628 cmdline: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe MD5: C2ED28C5339E0B3A5B676B45AD6D978B)
    • schtasks.exe (PID: 4200 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PpIvKmzUbDB.exe (PID: 1152 cmdline: "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe" MD5: C2ED28C5339E0B3A5B676B45AD6D978B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "mail@iaa-airferight.com", "Password": "Asaprocky11"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000E.00000002.2696170324.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316f7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31769:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317f3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31885:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318ef:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31961:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319f7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a87:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 9 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ParentImage: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe, ParentProcessId: 6812, ParentProcessName: 980001672 PPR for 30887217.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ProcessId: 5800, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ParentImage: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe, ParentProcessId: 6812, ParentProcessName: 980001672 PPR for 30887217.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ProcessId: 5800, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe, ParentImage: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe, ParentProcessId: 1628, ParentProcessName: PpIvKmzUbDB.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp", ProcessId: 4200, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe, Initiated: true, ProcessId: 6408, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49710
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ParentImage: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe, ParentProcessId: 6812, ParentProcessName: 980001672 PPR for 30887217.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp", ProcessId: 3456, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ParentImage: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe, ParentProcessId: 6812, ParentProcessName: 980001672 PPR for 30887217.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ProcessId: 5800, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe", ParentImage: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe, ParentProcessId: 6812, ParentProcessName: 980001672 PPR for 30887217.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp", ProcessId: 3456, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 980001672 PPR for 30887217.scr.exeAvira: detected
                    Source: http://mail.iaa-airferight.comAvira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeAvira: detection malicious, Label: HEUR/AGEN.1307351
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "mail@iaa-airferight.com", "Password": "Asaprocky11"}
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeReversingLabs: Detection: 26%
                    Source: 980001672 PPR for 30887217.scr.exeReversingLabs: Detection: 26%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeJoe Sandbox ML: detected
                    Source: 980001672 PPR for 30887217.scr.exeJoe Sandbox ML: detected
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49707 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49711 version: TLS 1.2
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: ASLAGIDKOM-NETUA ASLAGIDKOM-NETUA
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.8:49710 -> 46.175.148.58:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                    Source: 980001672 PPR for 30887217.scr.exe, PpIvKmzUbDB.exe.0.drString found in binary or memory: http://localhost/calculator_server/requests.php
                    Source: 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1468454106.0000000003117000.00000004.00000800.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000A.00000002.1514445576.0000000003457000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49707 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49711 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, abAX9N.cs.Net Code: BFeixnEv
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, abAX9N.cs.Net Code: BFeixnEv
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary

                    barindex
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_02F23E280_2_02F23E28
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_02F24B010_2_02F24B01
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_02F26F900_2_02F26F90
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_02F2DFB40_2_02F2DFB4
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_07600E080_2_07600E08
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_076047200_2_07604720
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_076066000_2_07606600
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_07603EB00_2_07603EB0
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_07600DF90_2_07600DF9
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_076042E80_2_076042E8
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_076042D80_2_076042D8
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_076059C00_2_076059C0
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_07F408A40_2_07F408A4
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_07F425180_2_07F42518
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_01124A989_2_01124A98
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_01123E809_2_01123E80
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_011241C89_2_011241C8
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_0112F8A59_2_0112F8A5
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B45A09_2_069B45A0
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B5D309_2_069B5D30
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B35789_2_069B3578
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069BE0B99_2_069BE0B9
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B10309_2_069B1030
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B91E29_2_069B91E2
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069BA1409_2_069BA140
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B56509_2_069B5650
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069B3C8F9_2_069B3C8F
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_069BC3589_2_069BC358
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_01963E2810_2_01963E28
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_01966F9010_2_01966F90
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_0196DFB410_2_0196DFB4
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_057D116410_2_057D1164
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_057D115810_2_057D1158
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_057D004010_2_057D0040
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_057D000710_2_057D0007
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_057D1FF610_2_057D1FF6
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07810E0810_2_07810E08
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_0781472010_2_07814720
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_0781660010_2_07816600
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07813E5010_2_07813E50
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07810DF910_2_07810DF9
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_078142D810_2_078142D8
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_078142E810_2_078142E8
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_078159C010_2_078159C0
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07C608A410_2_07C608A4
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07C6B8E910_2_07C6B8E9
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07C6251810_2_07C62518
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_07C6F10810_2_07C6F108
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010BA95714_2_010BA957
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010B4A9814_2_010B4A98
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010BDD5F14_2_010BDD5F
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010B3E8014_2_010B3E80
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010B41C814_2_010B41C8
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F45A014_2_068F45A0
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F5D3014_2_068F5D30
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F357814_2_068F3578
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068FE0B914_2_068FE0B9
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F103014_2_068F1030
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F91EB14_2_068F91EB
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068FA14014_2_068FA140
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F565014_2_068F5650
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068F3C8F14_2_068F3C8F
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_068FC35814_2_068FC358
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1468454106.000000000312C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1472918685.000000000622A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000000.1439562509.0000000000CFA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYLCxD.exe" vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1468454106.0000000003117000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1472566116.0000000005A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1474643730.0000000007550000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000000.00000002.1462878341.00000000012BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2691965313.0000000000BD8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exeBinary or memory string: OriginalFilenameYLCxD.exe" vs 980001672 PPR for 30887217.scr.exe
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: PpIvKmzUbDB.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, RsYAkkzVoy.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, Kqqzixk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, xROdzGigX.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, ywes.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, iPVW0zV.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, 1Pi9sgbHwoV.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, pJq8U2aptIKF5n7Q2L.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, ywfhRrvSAdRJx7tAsQ.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, ywfhRrvSAdRJx7tAsQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, ywfhRrvSAdRJx7tAsQ.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, ywfhRrvSAdRJx7tAsQ.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, ywfhRrvSAdRJx7tAsQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, ywfhRrvSAdRJx7tAsQ.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, pJq8U2aptIKF5n7Q2L.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@2/2
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile created: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1384:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3648:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6136:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5524:120:WilError_03
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7B3.tmpJump to behavior
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 980001672 PPR for 30887217.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 980001672 PPR for 30887217.scr.exeReversingLabs: Detection: 26%
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile read: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess created: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess created: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeSection loaded: edputil.dll
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, ywfhRrvSAdRJx7tAsQ.cs.Net Code: SyDKmsInLltoTGlhWOK System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.5a80000.3.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, ywfhRrvSAdRJx7tAsQ.cs.Net Code: SyDKmsInLltoTGlhWOK System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_02F25E00 push eax; iretd 0_2_02F25E09
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_0760BEF0 push cs; iretd 0_2_0760BF0F
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 0_2_0760B8EB push esp; retf 0_2_0760B8F1
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_01127A1D pushfd ; iretd 9_2_01127A22
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_01120C55 push ebx; retf 9_2_01120C52
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeCode function: 9_2_01120C6D push edi; retf 9_2_01120C7A
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_01965E00 push eax; iretd 10_2_01965E09
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 10_2_0781AE28 push esp; retn 077Fh10_2_0781AE69
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010B7A1D pushfd ; iretd 14_2_010B7A22
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeCode function: 14_2_010B0C6D push edi; retf 14_2_010B0C7A
                    Source: 980001672 PPR for 30887217.scr.exeStatic PE information: section name: .text entropy: 7.785707287399863
                    Source: PpIvKmzUbDB.exe.0.drStatic PE information: section name: .text entropy: 7.785707287399863
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, VP8x08lpCg2R8DNxmHL.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IGnPNyMuJg', 'kL8P80WAb6', 'HCbPQ4Pcec', 'y6VPk16o6N', 'LK8P7bpjUC', 'AbtP5ImCs3', 'klIPwhwVu0'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, eEhlJn5y6fubQUEjdE.csHigh entropy of concatenated method names: 'ToString', 'Dl7YNGwd0n', 'GYPYSU2xPv', 'obSY1iGrYr', 'YlOYbZSjxC', 'F12YGvRgmo', 'L6qYWJciX2', 'FZaYOYEpa9', 'LjBYxJbpB5', 'hxZYTA2Uk8'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, BCMnjV6Colu9Vcjs5U.csHigh entropy of concatenated method names: 'm6oVZo0Lg4', 'HA2VoyACdl', 'QxrVMD4jvF', 'KxVVJLDBhS', 'xgTVvHN97B', 'kYiMdxRqit', 'aZ0Mi2mCee', 'U4fMhSt7SF', 'k5QMyGT8tc', 'CHMMHE5ZmP'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, wNw74bHXs0maqBd5t4.csHigh entropy of concatenated method names: 'BPIC6yW2ZL', 'hu4CSw3Um4', 'DICC1GcHWM', 'UnpCb2Rorp', 'UDRCGlQHh4', 'JL9CWkiG8h', 'FYECORJHk1', 'xHSCxniwam', 'vhjCTtrY8R', 'VIyCt0MtA2'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, r1Vi2dzTOs0VDm4yt0.csHigh entropy of concatenated method names: 'jFaPeaQ0iP', 'oELPa3I9XF', 'JkkPXa6OSd', 'Yh8P6HyUMa', 'c7CPSQwQOo', 'WIqPbVI5p6', 'u8QPGk0Y0H', 'EJxPLrZkU7', 'nXcPukntR8', 'EsDP2hwRIe'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, TCGTi0T7OchMG58grO.csHigh entropy of concatenated method names: 'QCqJu8sKiK', 'VbsJ2VF9ug', 'HL6Jg4KIRY', 'dlrJnlTUHs', 'nJvJIONasy', 'z9GJenwLri', 'fRbJU7fr6O', 'GdMJatIWVr', 'fX9JXLtQRE', 'Fc1Jsici1b'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, MIHqUPQNct9tw9NClb.csHigh entropy of concatenated method names: 'frHqaF2mpH', 'J9wqXHXVmb', 'pcnq6RcCa2', 'y3lqSC886T', 'yNSqbbiEkj', 'QvYqGdOoeK', 'znTqObonrB', 'KVRqxOLsWN', 'SchqtfrB8k', 'WhoqN7T8wV'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, C5ZPVHljiZfSWPcFgFZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'grDBC40AAM', 'X13BPp43eW', 'eqZBADpRxG', 'rT2BBdAVPE', 'n59B0Fu9jc', 'wJPBrbCEX6', 'dCQBLInpgw'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, mZcOda9wIsyTZWihIU.csHigh entropy of concatenated method names: 'jFugg0tj5', 'iglnR8ySU', 'MNdefrspv', 'usrU94EWd', 'cQiXjZC6E', 'pPRsHkty0', 'VeMUpx50jYmP2aPrTt', 'XDqSgVD8uFVv4FbX6R', 'Htb3DFGmG', 'XWoPvqD0i'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, pJq8U2aptIKF5n7Q2L.csHigh entropy of concatenated method names: 'hGvokKbEle', 'kfeo7Ai5Au', 'S2Do5p68Uk', 'iBvowZQr79', 'li0odYoedk', 'JnLoidkBW2', 'vROohkSBBv', 'Q8foyKQjN1', 'LXMoHxQNhd', 'gnyoDaZ20F'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, vj7DrWsWsS5rGgZ0JI.csHigh entropy of concatenated method names: 'VXDMIL2gNa', 'EqdMU1JrGD', 'q7sK1mtp6b', 'LOfKb3utDy', 'YkTKGWsOtO', 'EHYKWsvpys', 'CJ2KODwWgK', 'YXPKxcVTop', 'G8mKTxD9Ab', 'bNRKtiLZZN'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, WP3Ov4h3g519DdkKHV.csHigh entropy of concatenated method names: 'm1CCm8rSb7', 'nhbCfy52FS', 'O3RCCZrYCE', 'u55CALguxr', 'cZ4C0DfyQA', 'PZwCLOBT8B', 'Dispose', 'j4Q3RAouXF', 'KpL3o6Se4S', 'PRG3K7KIsH'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, xeb2GJXQ5OwCmEvcd6.csHigh entropy of concatenated method names: 'TwvKnJbcTp', 'Y47KelIYVI', 'a2WKaBm4E6', 'XeqKXstsnZ', 'AyaKmuOCpn', 'lFgKYfcjuf', 'OCYKf9ZHyB', 'AZZK3SZ3B7', 't12KCouWfD', 'MVEKPEE5FB'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, cRxpNEDGLmiGYqsh9h.csHigh entropy of concatenated method names: 'LLZPKriiAS', 'uBvPMb4tgS', 'Tg9PVt86iW', 'G20PJEdEBd', 'J2GPCZq6mI', 'I1RPvSGI1q', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, si1CgDjQ3mdO1bqhqY.csHigh entropy of concatenated method names: 'jaYlJJq8U2', 'atIlvKF5n7', 'jQ5l4OwCmE', 'kcdlF60j7D', 'zZ0lmJIeCM', 'AjVlYColu9', 'ljBTlta3ERFoQjhY4h', 'rkUZIiiZSa1pAl0AV7', 'h64llouIGE', 'wH5lEO4Uvw'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, f8Yx2VwLIG2QjqKdIi.csHigh entropy of concatenated method names: 'I92f422O1D', 'eWEfFDnX5r', 'ToString', 'UZGfRdfGh2', 'QdyfoogtWp', 'UMFfKXsegZ', 'xF3fMjxnKp', 'awGfVFbQTV', 'KyVfJjpkeD', 'gBxfvJCaB9'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, tfvD9GONI24i9FRncK.csHigh entropy of concatenated method names: 'a8hJRSSMsV', 'w04JKXmnvL', 'RoYJVdiVr9', 'iRmVD6KtUA', 'MqLVzyxEjI', 'GhJJpFlMRl', 'k9yJlLVDj5', 'OkoJ9QEZIh', 'uP6JEKZJkj', 'IfkJjx3VUX'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, uI9OvFoqN2m38omLrC.csHigh entropy of concatenated method names: 'Dispose', 'S19lHDdkKH', 'lxD9SA4tWB', 'iMteit5CPs', 'jGYlDYuyvD', 'MW3lzpgu0M', 'ProcessDialogKey', 'Gir9pNw74b', 'Es09lmaqBd', 'St4999RxpN'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, UDaVkAKybY9Thfag8n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Fq09H7DraP', 'vrJ9DLdwAp', 'xhI9z2An4b', 'zR6EpBjpgW', 'thFElTD9RR', 'TNwE95KLtI', 'GZ3EESgnH8', 'v54T1QcIuZGDQqWxGV'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, y4pS0DllhVP7FOyj4U5.csHigh entropy of concatenated method names: 'yqePDPJS9k', 'rVyPzwLx2i', 'efRApOFMOd', 'BXlAlcf189', 'dopA9S5Vw6', 'bETAEtA3Km', 'w89AjZbCF5', 'tCVAZSfKbQ', 'D3oARvOvhs', 'DebAoMe4yU'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, ywfhRrvSAdRJx7tAsQ.csHigh entropy of concatenated method names: 'C53EZeNkOe', 'jofERKY7yh', 'nSREoMhc7A', 'QwSEKavR4a', 'qIWEMQXQjI', 'CCSEVJA0ak', 'wwZEJMreui', 'f7jEvjMefm', 'dSiEcVyBNw', 'GLvE4pFxs2'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.7550000.4.raw.unpack, XPJ3mviHc9Hvk95Ym2.csHigh entropy of concatenated method names: 't8TfylEVvx', 'v9wfDEquPW', 'yOI3pOdLBD', 'pBS3lQyR5T', 'tS5fNB9GwP', 'XSaf83xAMN', 'IH1fQYQ4RY', 'p7TfkhRATr', 'rfIf7WwGXg', 'JFMf5SQGqj'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, VP8x08lpCg2R8DNxmHL.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IGnPNyMuJg', 'kL8P80WAb6', 'HCbPQ4Pcec', 'y6VPk16o6N', 'LK8P7bpjUC', 'AbtP5ImCs3', 'klIPwhwVu0'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, eEhlJn5y6fubQUEjdE.csHigh entropy of concatenated method names: 'ToString', 'Dl7YNGwd0n', 'GYPYSU2xPv', 'obSY1iGrYr', 'YlOYbZSjxC', 'F12YGvRgmo', 'L6qYWJciX2', 'FZaYOYEpa9', 'LjBYxJbpB5', 'hxZYTA2Uk8'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, BCMnjV6Colu9Vcjs5U.csHigh entropy of concatenated method names: 'm6oVZo0Lg4', 'HA2VoyACdl', 'QxrVMD4jvF', 'KxVVJLDBhS', 'xgTVvHN97B', 'kYiMdxRqit', 'aZ0Mi2mCee', 'U4fMhSt7SF', 'k5QMyGT8tc', 'CHMMHE5ZmP'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, wNw74bHXs0maqBd5t4.csHigh entropy of concatenated method names: 'BPIC6yW2ZL', 'hu4CSw3Um4', 'DICC1GcHWM', 'UnpCb2Rorp', 'UDRCGlQHh4', 'JL9CWkiG8h', 'FYECORJHk1', 'xHSCxniwam', 'vhjCTtrY8R', 'VIyCt0MtA2'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, r1Vi2dzTOs0VDm4yt0.csHigh entropy of concatenated method names: 'jFaPeaQ0iP', 'oELPa3I9XF', 'JkkPXa6OSd', 'Yh8P6HyUMa', 'c7CPSQwQOo', 'WIqPbVI5p6', 'u8QPGk0Y0H', 'EJxPLrZkU7', 'nXcPukntR8', 'EsDP2hwRIe'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, TCGTi0T7OchMG58grO.csHigh entropy of concatenated method names: 'QCqJu8sKiK', 'VbsJ2VF9ug', 'HL6Jg4KIRY', 'dlrJnlTUHs', 'nJvJIONasy', 'z9GJenwLri', 'fRbJU7fr6O', 'GdMJatIWVr', 'fX9JXLtQRE', 'Fc1Jsici1b'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, MIHqUPQNct9tw9NClb.csHigh entropy of concatenated method names: 'frHqaF2mpH', 'J9wqXHXVmb', 'pcnq6RcCa2', 'y3lqSC886T', 'yNSqbbiEkj', 'QvYqGdOoeK', 'znTqObonrB', 'KVRqxOLsWN', 'SchqtfrB8k', 'WhoqN7T8wV'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, C5ZPVHljiZfSWPcFgFZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'grDBC40AAM', 'X13BPp43eW', 'eqZBADpRxG', 'rT2BBdAVPE', 'n59B0Fu9jc', 'wJPBrbCEX6', 'dCQBLInpgw'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, mZcOda9wIsyTZWihIU.csHigh entropy of concatenated method names: 'jFugg0tj5', 'iglnR8ySU', 'MNdefrspv', 'usrU94EWd', 'cQiXjZC6E', 'pPRsHkty0', 'VeMUpx50jYmP2aPrTt', 'XDqSgVD8uFVv4FbX6R', 'Htb3DFGmG', 'XWoPvqD0i'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, pJq8U2aptIKF5n7Q2L.csHigh entropy of concatenated method names: 'hGvokKbEle', 'kfeo7Ai5Au', 'S2Do5p68Uk', 'iBvowZQr79', 'li0odYoedk', 'JnLoidkBW2', 'vROohkSBBv', 'Q8foyKQjN1', 'LXMoHxQNhd', 'gnyoDaZ20F'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, vj7DrWsWsS5rGgZ0JI.csHigh entropy of concatenated method names: 'VXDMIL2gNa', 'EqdMU1JrGD', 'q7sK1mtp6b', 'LOfKb3utDy', 'YkTKGWsOtO', 'EHYKWsvpys', 'CJ2KODwWgK', 'YXPKxcVTop', 'G8mKTxD9Ab', 'bNRKtiLZZN'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, WP3Ov4h3g519DdkKHV.csHigh entropy of concatenated method names: 'm1CCm8rSb7', 'nhbCfy52FS', 'O3RCCZrYCE', 'u55CALguxr', 'cZ4C0DfyQA', 'PZwCLOBT8B', 'Dispose', 'j4Q3RAouXF', 'KpL3o6Se4S', 'PRG3K7KIsH'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, xeb2GJXQ5OwCmEvcd6.csHigh entropy of concatenated method names: 'TwvKnJbcTp', 'Y47KelIYVI', 'a2WKaBm4E6', 'XeqKXstsnZ', 'AyaKmuOCpn', 'lFgKYfcjuf', 'OCYKf9ZHyB', 'AZZK3SZ3B7', 't12KCouWfD', 'MVEKPEE5FB'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, cRxpNEDGLmiGYqsh9h.csHigh entropy of concatenated method names: 'LLZPKriiAS', 'uBvPMb4tgS', 'Tg9PVt86iW', 'G20PJEdEBd', 'J2GPCZq6mI', 'I1RPvSGI1q', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, si1CgDjQ3mdO1bqhqY.csHigh entropy of concatenated method names: 'jaYlJJq8U2', 'atIlvKF5n7', 'jQ5l4OwCmE', 'kcdlF60j7D', 'zZ0lmJIeCM', 'AjVlYColu9', 'ljBTlta3ERFoQjhY4h', 'rkUZIiiZSa1pAl0AV7', 'h64llouIGE', 'wH5lEO4Uvw'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, f8Yx2VwLIG2QjqKdIi.csHigh entropy of concatenated method names: 'I92f422O1D', 'eWEfFDnX5r', 'ToString', 'UZGfRdfGh2', 'QdyfoogtWp', 'UMFfKXsegZ', 'xF3fMjxnKp', 'awGfVFbQTV', 'KyVfJjpkeD', 'gBxfvJCaB9'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, tfvD9GONI24i9FRncK.csHigh entropy of concatenated method names: 'a8hJRSSMsV', 'w04JKXmnvL', 'RoYJVdiVr9', 'iRmVD6KtUA', 'MqLVzyxEjI', 'GhJJpFlMRl', 'k9yJlLVDj5', 'OkoJ9QEZIh', 'uP6JEKZJkj', 'IfkJjx3VUX'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, uI9OvFoqN2m38omLrC.csHigh entropy of concatenated method names: 'Dispose', 'S19lHDdkKH', 'lxD9SA4tWB', 'iMteit5CPs', 'jGYlDYuyvD', 'MW3lzpgu0M', 'ProcessDialogKey', 'Gir9pNw74b', 'Es09lmaqBd', 'St4999RxpN'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, UDaVkAKybY9Thfag8n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Fq09H7DraP', 'vrJ9DLdwAp', 'xhI9z2An4b', 'zR6EpBjpgW', 'thFElTD9RR', 'TNwE95KLtI', 'GZ3EESgnH8', 'v54T1QcIuZGDQqWxGV'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, y4pS0DllhVP7FOyj4U5.csHigh entropy of concatenated method names: 'yqePDPJS9k', 'rVyPzwLx2i', 'efRApOFMOd', 'BXlAlcf189', 'dopA9S5Vw6', 'bETAEtA3Km', 'w89AjZbCF5', 'tCVAZSfKbQ', 'D3oARvOvhs', 'DebAoMe4yU'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, ywfhRrvSAdRJx7tAsQ.csHigh entropy of concatenated method names: 'C53EZeNkOe', 'jofERKY7yh', 'nSREoMhc7A', 'QwSEKavR4a', 'qIWEMQXQjI', 'CCSEVJA0ak', 'wwZEJMreui', 'f7jEvjMefm', 'dSiEcVyBNw', 'GLvE4pFxs2'
                    Source: 0.2.980001672 PPR for 30887217.scr.exe.4333718.2.raw.unpack, XPJ3mviHc9Hvk95Ym2.csHigh entropy of concatenated method names: 't8TfylEVvx', 'v9wfDEquPW', 'yOI3pOdLBD', 'pBS3lQyR5T', 'tS5fNB9GwP', 'XSaf83xAMN', 'IH1fQYQ4RY', 'p7TfkhRATr', 'rfIf7WwGXg', 'JFMf5SQGqj'
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile created: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6812, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PpIvKmzUbDB.exe PID: 1628, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 30E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 8000000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 7750000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 9000000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: A000000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 1120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 18C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 3420000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 18C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 7D20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 7960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 8D20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 9D20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 10B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 2F30000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory allocated: 1730000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3703Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 362Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4567Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWindow / User API: threadDelayed 3756Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWindow / User API: threadDelayed 6090Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWindow / User API: threadDelayed 5824
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWindow / User API: threadDelayed 4028
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1936Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4136Thread sleep count: 3703 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5080Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3832Thread sleep count: 362 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4640Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3276Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6876Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 6108Thread sleep count: 3756 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 6108Thread sleep count: 6090 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99749s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99530s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -99093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98870s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98651s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -98000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -97094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96978s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96874s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96644s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96516s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96363s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96241s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -96078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95921s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95591s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -95047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94718s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94390s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94281s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe TID: 1824Thread sleep time: -94172s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 4080Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep count: 38 > 30
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -35048813740048126s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 1384Thread sleep count: 5824 > 30
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 1384Thread sleep count: 4028 > 30
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99777s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99545s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99421s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99312s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99203s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -99093s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98874s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98639s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98524s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98419s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98229s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -98076s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97850s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97727s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97624s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97514s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97405s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97171s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -97062s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96952s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96718s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96605s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96484s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96374s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96265s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96140s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -96031s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95921s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95812s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95702s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95467s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95285s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95139s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -95030s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94919s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94793s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94680s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94447s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94234s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe TID: 3340Thread sleep time: -94125s >= -30000s
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99859Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99749Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99640Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99530Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99421Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99312Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 99093Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98870Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98765Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98651Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98546Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98218Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 98000Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97781Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97672Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97547Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97437Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97328Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97219Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 97094Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96978Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96874Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96765Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96644Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96516Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96363Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96241Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 96078Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95921Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95812Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95703Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95591Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95484Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95375Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95265Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95156Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 95047Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94937Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94828Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94718Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94609Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94500Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94390Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94281Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeThread delayed: delay time: 94172Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99890
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99777
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99545
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99421
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99312
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99203
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 99093
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98984
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98874
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98765
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98639
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98524
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98419
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98229
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 98076
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97850
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97727
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97624
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97514
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97405
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97281
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97171
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 97062
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96952
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96828
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96718
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96605
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96484
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96374
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96265
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96140
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 96031
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95921
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95812
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95702
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95578
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95467
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95285
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95139
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 95030
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94919
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94793
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94680
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94578
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94447
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94343
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94234
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeThread delayed: delay time: 94125
                    Source: 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2692143565.0000000000EFD000.00000004.00000020.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2692533920.0000000000F8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeMemory written: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeMemory written: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeProcess created: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeProcess created: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2696170324.0000000002FAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2696096691.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2696096691.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6812, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PpIvKmzUbDB.exe PID: 1152, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2696096691.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6812, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PpIvKmzUbDB.exe PID: 1152, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.4124390.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.980001672 PPR for 30887217.scr.exe.40e9970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2696170324.0000000002FAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2696096691.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2696096691.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6812, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 980001672 PPR for 30887217.scr.exe PID: 6408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PpIvKmzUbDB.exe PID: 1152, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model21
                    Input Capture
                    23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSH1
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570147 Sample: 980001672 PPR for 30887217.... Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 46 mail.iaa-airferight.com 2->46 48 api.ipify.org 2->48 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 14 other signatures 2->60 8 980001672 PPR for 30887217.scr.exe 7 2->8         started        12 PpIvKmzUbDB.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\PpIvKmzUbDB.exe, PE32 8->38 dropped 40 C:\Users\...\PpIvKmzUbDB.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\Temp\tmp7B3.tmp, XML 8->42 dropped 44 C:\...\980001672 PPR for 30887217.scr.exe.log, ASCII 8->44 dropped 62 Adds a directory exclusion to Windows Defender 8->62 64 Injects a PE file into a foreign processes 8->64 14 980001672 PPR for 30887217.scr.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        66 Antivirus detection for dropped file 12->66 68 Multi AV Scanner detection for dropped file 12->68 70 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->70 72 Machine Learning detection for dropped file 12->72 24 PpIvKmzUbDB.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 50 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->50 52 api.ipify.org 172.67.74.152, 443, 49707, 49711 CLOUDFLARENETUS United States 14->52 74 Installs a global keyboard hook 14->74 76 Loading BitLocker PowerShell Module 18->76 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        78 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->78 80 Tries to steal Mail credentials (via file / registry access) 24->80 82 Tries to harvest and steal ftp login credentials 24->82 84 Tries to harvest and steal browser information (history, passwords, etc) 24->84 36 conhost.exe 26->36         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    980001672 PPR for 30887217.scr.exe26%ReversingLabs
                    980001672 PPR for 30887217.scr.exe100%AviraHEUR/AGEN.1307351
                    980001672 PPR for 30887217.scr.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe100%AviraHEUR/AGEN.1307351
                    C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe26%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.iaa-airferight.com100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.iaa-airferight.com
                    46.175.148.58
                    truetrue
                      unknown
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.org980001672 PPR for 30887217.scr.exe, 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/980001672 PPR for 30887217.scr.exe, 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org/t980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name980001672 PPR for 30887217.scr.exe, 00000000.00000002.1468454106.0000000003117000.00000004.00000800.00020000.00000000.sdmp, 980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000A.00000002.1514445576.0000000003457000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002F31000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://localhost/calculator_server/requests.php980001672 PPR for 30887217.scr.exe, PpIvKmzUbDB.exe.0.drfalse
                                    high
                                    http://mail.iaa-airferight.com980001672 PPR for 30887217.scr.exe, 00000009.00000002.2696096691.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, PpIvKmzUbDB.exe, 0000000E.00000002.2696170324.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    46.175.148.58
                                    mail.iaa-airferight.comUkraine
                                    56394ASLAGIDKOM-NETUAtrue
                                    172.67.74.152
                                    api.ipify.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1570147
                                    Start date and time:2024-12-06 15:44:07 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 2s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:980001672 PPR for 30887217.scr.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@19/15@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 170
                                    • Number of non-executed functions: 7
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • VT rate limit hit for: 980001672 PPR for 30887217.scr.exe
                                    TimeTypeDescription
                                    09:45:07API Interceptor1643728x Sleep call for process: 980001672 PPR for 30887217.scr.exe modified
                                    09:45:09API Interceptor41x Sleep call for process: powershell.exe modified
                                    09:45:13API Interceptor798208x Sleep call for process: PpIvKmzUbDB.exe modified
                                    15:45:09Task SchedulerRun new task: PpIvKmzUbDB path: C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    46.175.148.58lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                      OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                          v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                            l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                              SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                  McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                    55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      tEEa6j67ss.exeGet hashmaliciousAgentTeslaBrowse
                                                        172.67.74.152Simple1.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        Simple2.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                        • api.ipify.org/
                                                        Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                                        • api.ipify.org/
                                                        y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                                        • api.ipify.org/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        mail.iaa-airferight.comlC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                        • 46.175.148.58
                                                        RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 46.175.148.58
                                                        2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 46.175.148.58
                                                        55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 46.175.148.58
                                                        tEEa6j67ss.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        api.ipify.orgy1rS62yprs.exeGet hashmaliciousBabadedaBrowse
                                                        • 104.26.13.205
                                                        apilibx64.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                        • 104.26.12.205
                                                        xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                                        • 104.26.12.205
                                                        BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                                        • 104.26.13.205
                                                        lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                                        • 104.26.13.205
                                                        GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                                        • 104.26.12.205
                                                        8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                                        • 104.26.12.205
                                                        Simple1.exeGet hashmaliciousUnknownBrowse
                                                        • 172.67.74.152
                                                        Simple1.exeGet hashmaliciousUnknownBrowse
                                                        • 104.26.13.205
                                                        Simple2.exeGet hashmaliciousUnknownBrowse
                                                        • 104.26.12.205
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ASLAGIDKOM-NETUAlC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                        • 46.175.148.58
                                                        RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 46.175.148.58
                                                        2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 46.175.148.58
                                                        55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 46.175.148.58
                                                        tEEa6j67ss.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 46.175.148.58
                                                        CLOUDFLARENETUShttps://drive.usercontent.google.com/u/0/uc?id=1-lzlsIQVVFZj1nVUNs7vmgIfcVZr8ZT3&export=downloadGet hashmaliciousUnknownBrowse
                                                        • 104.22.20.144
                                                        qe4efGS22G.exeGet hashmaliciousUnknownBrowse
                                                        • 104.18.21.66
                                                        ALFq7XP17d.lnkGet hashmaliciousUnknownBrowse
                                                        • 172.67.201.111
                                                        JSWunwO4rS.lnkGet hashmaliciousLummaC StealerBrowse
                                                        • 172.67.219.101
                                                        IErMYVWrv9.exeGet hashmaliciousPython Stealer, Luna Grabber, Luna LoggerBrowse
                                                        • 162.159.135.232
                                                        7p5nITtglJ.lnkGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                        • 172.65.251.78
                                                        kjshdkfgjsdg.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                        • 172.65.251.78
                                                        https://wdurl.ru/4mA#yml4dckta8ps5szGet hashmaliciousUnknownBrowse
                                                        • 104.21.74.88
                                                        jew.x86.elfGet hashmaliciousUnknownBrowse
                                                        • 1.4.26.77
                                                        jew.mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 104.23.193.103
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        3b5074b1b5d032e5620f69f9f700ff0elg1wwLsmCX.exeGet hashmaliciousUnknownBrowse
                                                        • 172.67.74.152
                                                        y1rS62yprs.exeGet hashmaliciousBabadedaBrowse
                                                        • 172.67.74.152
                                                        IFhqcKaIol.lnkGet hashmaliciousUnknownBrowse
                                                        • 172.67.74.152
                                                        JSWunwO4rS.lnkGet hashmaliciousLummaC StealerBrowse
                                                        • 172.67.74.152
                                                        7p5nITtglJ.lnkGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                        • 172.67.74.152
                                                        kjshdkfgjsdg.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                        • 172.67.74.152
                                                        https://t.ly/alBFXGet hashmaliciousUnknownBrowse
                                                        • 172.67.74.152
                                                        QD40FIJ8QK.lnkGet hashmaliciousUnknownBrowse
                                                        • 172.67.74.152
                                                        TEKL_F _STE_I Unilever San ve Tic Trk A__PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.74.152
                                                        No context
                                                        Process:C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):1216
                                                        Entropy (8bit):5.34331486778365
                                                        Encrypted:false
                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                        Malicious:true
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                        Process:C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1216
                                                        Entropy (8bit):5.34331486778365
                                                        Encrypted:false
                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):2232
                                                        Entropy (8bit):5.380503343696294
                                                        Encrypted:false
                                                        SSDEEP:48:+WSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMugeoPUyus:+LHxv2IfLZ2KRH6OugYs
                                                        MD5:6330406134F07C4344EF6A6DFFA6FF77
                                                        SHA1:FC73921B1F3F20B019F281B62E0C9D06FE161196
                                                        SHA-256:09EC8B3734FA3F2A1E1E7E83396F9A13C426C3F7F4A0514DFBD6D19686839B21
                                                        SHA-512:642FD0FC17C5B3C6CEBA78C37720BE1FEFDF81E6289567095CF24296C16CCFFADB587BBCA29659FD6EBF5F6D7A4C9688160809E41D283B098C179B0C502EA5C1
                                                        Malicious:false
                                                        Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                                        File Type:XML 1.0 document, ASCII text
                                                        Category:dropped
                                                        Size (bytes):1584
                                                        Entropy (8bit):5.1174212704784825
                                                        Encrypted:false
                                                        SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtFxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTbv
                                                        MD5:D42BBB597AD022A05E49870537AB2F04
                                                        SHA1:8E06E90FEA35F3B008C6D9DC0E6BA2882F69F459
                                                        SHA-256:883D746F5CFB1F8388222679C3DAA28D4DD9D166E93BDDAD50C0F05D7F7CAAC1
                                                        SHA-512:1B26AC3E9A121AC1A14029C39CDB46D22105F47CAD0D23015745E1646CE242614CD5B27639DBC2D74BDF4A4CAB9FD2D1FC3F1736DC5052F6B62F24D509931BEA
                                                        Malicious:false
                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                        Process:C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        File Type:XML 1.0 document, ASCII text
                                                        Category:dropped
                                                        Size (bytes):1584
                                                        Entropy (8bit):5.1174212704784825
                                                        Encrypted:false
                                                        SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtFxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTbv
                                                        MD5:D42BBB597AD022A05E49870537AB2F04
                                                        SHA1:8E06E90FEA35F3B008C6D9DC0E6BA2882F69F459
                                                        SHA-256:883D746F5CFB1F8388222679C3DAA28D4DD9D166E93BDDAD50C0F05D7F7CAAC1
                                                        SHA-512:1B26AC3E9A121AC1A14029C39CDB46D22105F47CAD0D23015745E1646CE242614CD5B27639DBC2D74BDF4A4CAB9FD2D1FC3F1736DC5052F6B62F24D509931BEA
                                                        Malicious:true
                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                        Process:C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):912896
                                                        Entropy (8bit):7.317085186679611
                                                        Encrypted:false
                                                        SSDEEP:12288:aPGU5KgkV9aVEbjN7tN8J05ZZIMGZedgx5zEn2lPlgrdm4Vz0Rppppppppppppp9:iKgK4uQKGzzhlP
                                                        MD5:C2ED28C5339E0B3A5B676B45AD6D978B
                                                        SHA1:6C25DC91C3E5E230645F83D49EDAA5E1F909393F
                                                        SHA-256:76144B7C900168C9893AAA223A1EC8E8081CD827C99EADD3A6695EFD0AD337DD
                                                        SHA-512:021362171A2511E313CDED56619E11C3A87FDBBE47806886B6D496161AF1B2DE2EBB3F875EBC05505A9428713B8DCB8B49DE4A65EA3E296C301B38A701C35269
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 26%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ZRg..............0..h.............. ........@.. .......................`............@.................................t...O.......L....................@....................................................... ............... ..H............text....f... ...h.................. ..`.rsrc...L............j..............@..@.reloc.......@......................@..B........................H.......L8..x!...........Y...,..........................................&.(......*...0.............X.+..*....0.............Y.+..*....0.............Z.+..*....0............"........,."...?....[.+..*.0..(.................,...+....Y(.......Y(....X.+..*.0..!........~.........,.s.........~.....+..*....0..R........r...p..r...p(....t......rc..po.......o......rm..po.....s.......o......+-..(.........(....r...p..(....r...p(....o....&..( ...-...........o!.....("....o#...o$.......ijo%....
                                                        Process:C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):26
                                                        Entropy (8bit):3.95006375643621
                                                        Encrypted:false
                                                        SSDEEP:3:ggPYV:rPYV
                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                        Malicious:true
                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):7.317085186679611
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        • DOS Executable Generic (2002/1) 0.01%
                                                        File name:980001672 PPR for 30887217.scr.exe
                                                        File size:912'896 bytes
                                                        MD5:c2ed28c5339e0b3a5b676b45ad6d978b
                                                        SHA1:6c25dc91c3e5e230645f83d49edaa5e1f909393f
                                                        SHA256:76144b7c900168c9893aaa223a1ec8e8081cd827c99eadd3a6695efd0ad337dd
                                                        SHA512:021362171a2511e313cded56619e11c3a87fdbbe47806886b6d496161af1b2de2ebb3f875ebc05505a9428713b8dcb8b49de4a65ea3e296c301b38a701c35269
                                                        SSDEEP:12288:aPGU5KgkV9aVEbjN7tN8J05ZZIMGZedgx5zEn2lPlgrdm4Vz0Rppppppppppppp9:iKgK4uQKGzzhlP
                                                        TLSH:2915F085E400EA26CE19A7341F32DA3507297EADBD31D22E5AED7CDB3FBB9925414013
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ZRg..............0..h............... ........@.. .......................`............@................................
                                                        Icon Hash:c5949296969e8473
                                                        Entrypoint:0x4a86c6
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x67525AA4 [Fri Dec 6 02:00:04 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        push ebx
                                                        add byte ptr [ecx+00h], bh
                                                        jnc 00007FC604E1F512h
                                                        je 00007FC604E1F512h
                                                        add byte ptr [ebp+00h], ch
                                                        add byte ptr [ecx+00h], al
                                                        arpl word ptr [eax], ax
                                                        je 00007FC604E1F512h
                                                        imul eax, dword ptr [eax], 00610076h
                                                        je 00007FC604E1F512h
                                                        outsd
                                                        add byte ptr [edx+00h], dh
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa86740x4f.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x3814c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xe40000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000xa66ec0xa68000b0555e1695d1833fa343603ac953bd8False0.9316538217905406data7.785707287399863IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xaa0000x3814c0x382005aa588eb759410a6dc952049e4a39912False0.3080717566815145data5.205795545155309IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xe40000xc0x200d12ec79440fa257df0fb8336359dccb8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xaa4900x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.38353658536585367
                                                        RT_ICON0xaaaf80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.48655913978494625
                                                        RT_ICON0xaade00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.5286885245901639
                                                        RT_ICON0xaafc80x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5878378378378378
                                                        RT_ICON0xab0f00x6739PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9933017975402081
                                                        RT_ICON0xb182c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.5578358208955224
                                                        RT_ICON0xb26d40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.6367328519855595
                                                        RT_ICON0xb2f7c0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.6497695852534562
                                                        RT_ICON0xb36440x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.47760115606936415
                                                        RT_ICON0xb3bac0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.125
                                                        RT_ICON0xc43d40x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.21113622030691612
                                                        RT_ICON0xcd87c0x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 265600.21157894736842106
                                                        RT_ICON0xd40640x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.24269870609981517
                                                        RT_ICON0xd94ec0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.22325224374114314
                                                        RT_ICON0xdd7140x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.3196058091286307
                                                        RT_ICON0xdfcbc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.3642120075046904
                                                        RT_ICON0xe0d640x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5086065573770492
                                                        RT_ICON0xe16ec0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5735815602836879
                                                        RT_GROUP_ICON0xe1b540x102data0.5697674418604651
                                                        RT_GROUP_ICON0xe1c580x14data1.05
                                                        RT_VERSION0xe1c6c0x2f4data0.43386243386243384
                                                        RT_MANIFEST0xe1f600x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 6, 2024 15:45:10.515013933 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:10.515063047 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:10.515141964 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:10.522721052 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:10.522731066 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:11.741411924 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:11.741590977 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:11.745471954 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:11.745486975 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:11.745816946 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:11.951328039 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:11.951421022 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:12.226412058 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:12.267343998 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:12.561753988 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:12.562197924 CET44349707172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:12.562258005 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:12.567365885 CET49707443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:13.783782959 CET4971025192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:14.985203981 CET4971025192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:15.201059103 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:15.201112032 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:15.201193094 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:15.204616070 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:15.204657078 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.431031942 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.431117058 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:16.433062077 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:16.433098078 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.433440924 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.578962088 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:16.654371977 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:16.695339918 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.988848925 CET4971025192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:16.993288994 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.993364096 CET44349711172.67.74.152192.168.2.8
                                                        Dec 6, 2024 15:45:16.993465900 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:17.016796112 CET49711443192.168.2.8172.67.74.152
                                                        Dec 6, 2024 15:45:18.271440983 CET4971325192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:19.282155037 CET4971325192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:20.985219955 CET4971025192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:21.282125950 CET4971325192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:25.282167912 CET4971325192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:29.000904083 CET4971025192.168.2.846.175.148.58
                                                        Dec 6, 2024 15:45:33.282944918 CET4971325192.168.2.846.175.148.58
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 6, 2024 15:45:10.358406067 CET6271253192.168.2.81.1.1.1
                                                        Dec 6, 2024 15:45:10.500093937 CET53627121.1.1.1192.168.2.8
                                                        Dec 6, 2024 15:45:13.494599104 CET5103153192.168.2.81.1.1.1
                                                        Dec 6, 2024 15:45:13.783000946 CET53510311.1.1.1192.168.2.8
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Dec 6, 2024 15:45:10.358406067 CET192.168.2.81.1.1.10xcc69Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                        Dec 6, 2024 15:45:13.494599104 CET192.168.2.81.1.1.10x86f6Standard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Dec 6, 2024 15:45:10.500093937 CET1.1.1.1192.168.2.80xcc69No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                        Dec 6, 2024 15:45:10.500093937 CET1.1.1.1192.168.2.80xcc69No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                        Dec 6, 2024 15:45:10.500093937 CET1.1.1.1192.168.2.80xcc69No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                        Dec 6, 2024 15:45:13.783000946 CET1.1.1.1192.168.2.80x86f6No error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false
                                                        • api.ipify.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.849707172.67.74.1524436408C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-06 14:45:12 UTC155OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                        Host: api.ipify.org
                                                        Connection: Keep-Alive
                                                        2024-12-06 14:45:12 UTC424INHTTP/1.1 200 OK
                                                        Date: Fri, 06 Dec 2024 14:45:12 GMT
                                                        Content-Type: text/plain
                                                        Content-Length: 12
                                                        Connection: close
                                                        Vary: Origin
                                                        CF-Cache-Status: DYNAMIC
                                                        Server: cloudflare
                                                        CF-RAY: 8edd0ef06b5643ca-EWR
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1772&min_rtt=1757&rtt_var=689&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1553191&cwnd=223&unsent_bytes=0&cid=1d6132aeede1a09e&ts=832&x=0"
                                                        2024-12-06 14:45:12 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                        Data Ascii: 8.46.123.228


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.849711172.67.74.1524431152C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-06 14:45:16 UTC155OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                        Host: api.ipify.org
                                                        Connection: Keep-Alive
                                                        2024-12-06 14:45:16 UTC424INHTTP/1.1 200 OK
                                                        Date: Fri, 06 Dec 2024 14:45:16 GMT
                                                        Content-Type: text/plain
                                                        Content-Length: 12
                                                        Connection: close
                                                        Vary: Origin
                                                        CF-Cache-Status: DYNAMIC
                                                        Server: cloudflare
                                                        CF-RAY: 8edd0f0c19514372-EWR
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1697&min_rtt=1679&rtt_var=666&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1600000&cwnd=242&unsent_bytes=0&cid=0ae2c6348091b80d&ts=567&x=0"
                                                        2024-12-06 14:45:16 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                        Data Ascii: 8.46.123.228


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:09:45:07
                                                        Start date:06/12/2024
                                                        Path:C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                                                        Imagebase:0xc50000
                                                        File size:912'896 bytes
                                                        MD5 hash:C2ED28C5339E0B3A5B676B45AD6D978B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1469392053.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:09:45:08
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                                                        Imagebase:0xd60000
                                                        File size:433'152 bytes
                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:09:45:08
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6ee680000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:09:45:08
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"
                                                        Imagebase:0xd60000
                                                        File size:433'152 bytes
                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:09:45:08
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6ee680000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:09:45:08
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp7B3.tmp"
                                                        Imagebase:0xa90000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:09:45:08
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6ee680000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:09:45:09
                                                        Start date:06/12/2024
                                                        Path:C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\980001672 PPR for 30887217.scr.exe"
                                                        Imagebase:0x960000
                                                        File size:912'896 bytes
                                                        MD5 hash:C2ED28C5339E0B3A5B676B45AD6D978B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2691709359.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2696096691.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2696096691.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2696096691.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:10
                                                        Start time:09:45:09
                                                        Start date:06/12/2024
                                                        Path:C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                                        Imagebase:0xe50000
                                                        File size:912'896 bytes
                                                        MD5 hash:C2ED28C5339E0B3A5B676B45AD6D978B
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 26%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:09:45:12
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                        Imagebase:0x7ff605670000
                                                        File size:496'640 bytes
                                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                        Has elevated privileges:true
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:12
                                                        Start time:09:45:13
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PpIvKmzUbDB" /XML "C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp"
                                                        Imagebase:0xa90000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:09:45:13
                                                        Start date:06/12/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6ee680000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:09:45:14
                                                        Start date:06/12/2024
                                                        Path:C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\PpIvKmzUbDB.exe"
                                                        Imagebase:0x8a0000
                                                        File size:912'896 bytes
                                                        MD5 hash:C2ED28C5339E0B3A5B676B45AD6D978B
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2696170324.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2696170324.0000000002FAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:9.3%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:1.9%
                                                          Total number of Nodes:314
                                                          Total number of Limit Nodes:22
                                                          execution_graph 38760 760a620 38761 760a7ab 38760->38761 38763 760a646 38760->38763 38763->38761 38764 76034e0 38763->38764 38765 760a8a0 PostMessageW 38764->38765 38766 760a90c 38765->38766 38766->38763 38998 2f2d460 38999 2f2d4a6 38998->38999 39003 2f2d640 38999->39003 39006 2f2d62f 38999->39006 39000 2f2d593 39009 2f2b0b4 39003->39009 39007 2f2d66e 39006->39007 39008 2f2b0b4 DuplicateHandle 39006->39008 39007->39000 39008->39007 39010 2f2d6a8 DuplicateHandle 39009->39010 39011 2f2d66e 39010->39011 39011->39000 38767 7606f24 38768 7607128 38767->38768 38769 76071a4 38768->38769 38774 7609440 38768->38774 38792 760949e 38768->38792 38811 7609431 38768->38811 38770 7607290 38775 760945a 38774->38775 38829 760988b 38775->38829 38834 7609c0b 38775->38834 38839 7609f0a 38775->38839 38844 7609be8 38775->38844 38849 7609b05 38775->38849 38853 7609ba3 38775->38853 38859 76099a3 38775->38859 38865 7609ca1 38775->38865 38871 7609b3e 38775->38871 38876 7609c59 38775->38876 38881 760a336 38775->38881 38887 7609ad6 38775->38887 38892 7609baf 38775->38892 38897 760980f 38775->38897 38902 760982d 38775->38902 38776 760947e 38776->38770 38793 760942c 38792->38793 38795 76094a1 38792->38795 38796 7609ca1 2 API calls 38793->38796 38797 76099a3 2 API calls 38793->38797 38798 7609ba3 3 API calls 38793->38798 38799 7609b05 2 API calls 38793->38799 38800 7609be8 2 API calls 38793->38800 38801 7609f0a 2 API calls 38793->38801 38802 7609c0b 2 API calls 38793->38802 38803 760988b 2 API calls 38793->38803 38804 760982d 2 API calls 38793->38804 38805 760980f 2 API calls 38793->38805 38806 7609baf 2 API calls 38793->38806 38807 7609ad6 2 API calls 38793->38807 38808 760a336 3 API calls 38793->38808 38809 7609c59 2 API calls 38793->38809 38810 7609b3e 2 API calls 38793->38810 38794 760947e 38794->38770 38795->38770 38796->38794 38797->38794 38798->38794 38799->38794 38800->38794 38801->38794 38802->38794 38803->38794 38804->38794 38805->38794 38806->38794 38807->38794 38808->38794 38809->38794 38810->38794 38812 7609440 38811->38812 38814 7609ca1 2 API calls 38812->38814 38815 76099a3 2 API calls 38812->38815 38816 7609ba3 3 API calls 38812->38816 38817 7609b05 2 API calls 38812->38817 38818 7609be8 2 API calls 38812->38818 38819 7609f0a 2 API calls 38812->38819 38820 7609c0b 2 API calls 38812->38820 38821 760988b 2 API calls 38812->38821 38822 760982d 2 API calls 38812->38822 38823 760980f 2 API calls 38812->38823 38824 7609baf 2 API calls 38812->38824 38825 7609ad6 2 API calls 38812->38825 38826 760a336 3 API calls 38812->38826 38827 7609c59 2 API calls 38812->38827 38828 7609b3e 2 API calls 38812->38828 38813 760947e 38813->38770 38814->38813 38815->38813 38816->38813 38817->38813 38818->38813 38819->38813 38820->38813 38821->38813 38822->38813 38823->38813 38824->38813 38825->38813 38826->38813 38827->38813 38828->38813 38830 760989e 38829->38830 38831 7609958 38830->38831 38907 7606af0 38830->38907 38911 7606ae4 38830->38911 38831->38776 38835 760a0fe 38834->38835 38916 760a5a0 38835->38916 38921 760a5b0 38835->38921 38836 760a117 38840 7609db2 38839->38840 38840->38839 38841 760a0f8 38840->38841 38934 7606430 38840->38934 38938 7606428 38840->38938 38841->38776 38845 7609b04 38844->38845 38846 7609a9e 38844->38846 38847 7606290 Wow64SetThreadContext 38845->38847 38848 7606298 Wow64SetThreadContext 38845->38848 38846->38776 38847->38846 38848->38846 38851 7606290 Wow64SetThreadContext 38849->38851 38852 7606298 Wow64SetThreadContext 38849->38852 38850 7609a9e 38850->38776 38851->38850 38852->38850 38854 760a33d 38853->38854 38942 7606520 38854->38942 38946 7606518 38854->38946 38950 76065f0 38854->38950 38855 760a35f 38860 7609941 38859->38860 38861 76099ad 38860->38861 38863 7606af0 CreateProcessA 38860->38863 38864 7606ae4 CreateProcessA 38860->38864 38861->38776 38862 7609958 38862->38776 38863->38862 38864->38862 38866 7609b55 38865->38866 38867 7609980 38865->38867 38869 7606430 WriteProcessMemory 38866->38869 38870 7606428 WriteProcessMemory 38866->38870 38868 7609b76 38868->38776 38869->38868 38870->38868 38872 7609b44 38871->38872 38874 7606430 WriteProcessMemory 38872->38874 38875 7606428 WriteProcessMemory 38872->38875 38873 7609b76 38873->38776 38874->38873 38875->38873 38877 7609c66 38876->38877 38954 76061e8 38877->38954 38958 76061e0 38877->38958 38878 7609980 38882 760a33c 38881->38882 38883 760a35f 38882->38883 38884 7606520 ReadProcessMemory 38882->38884 38885 76065f0 ReadProcessMemory 38882->38885 38886 7606518 ReadProcessMemory 38882->38886 38884->38883 38885->38883 38886->38883 38888 7609adc 38887->38888 38962 7606370 38888->38962 38966 7606368 38888->38966 38889 7609980 38893 7609bbf 38892->38893 38895 7606430 WriteProcessMemory 38893->38895 38896 7606428 WriteProcessMemory 38893->38896 38894 7609f8e 38895->38894 38896->38894 38898 7609818 38897->38898 38899 7609958 38898->38899 38900 7606af0 CreateProcessA 38898->38900 38901 7606ae4 CreateProcessA 38898->38901 38899->38776 38900->38899 38901->38899 38903 7609818 38902->38903 38904 760985a 38903->38904 38905 7606af0 CreateProcessA 38903->38905 38906 7606ae4 CreateProcessA 38903->38906 38904->38776 38905->38904 38906->38904 38908 7606b79 CreateProcessA 38907->38908 38910 7606d3b 38908->38910 38912 7606a7d 38911->38912 38913 7606aea CreateProcessA 38911->38913 38912->38831 38915 7606d3b 38913->38915 38917 760a5b0 38916->38917 38926 7606290 38917->38926 38930 7606298 38917->38930 38918 760a5db 38918->38836 38922 760a5c5 38921->38922 38924 7606290 Wow64SetThreadContext 38922->38924 38925 7606298 Wow64SetThreadContext 38922->38925 38923 760a5db 38923->38836 38924->38923 38925->38923 38927 76062dd Wow64SetThreadContext 38926->38927 38929 7606325 38927->38929 38929->38918 38931 76062dd Wow64SetThreadContext 38930->38931 38933 7606325 38931->38933 38933->38918 38935 7606478 WriteProcessMemory 38934->38935 38937 76064cf 38935->38937 38937->38840 38939 7606431 WriteProcessMemory 38938->38939 38941 76064cf 38939->38941 38941->38840 38943 760656b ReadProcessMemory 38942->38943 38945 76065af 38943->38945 38945->38855 38947 760656b ReadProcessMemory 38946->38947 38949 76065af 38947->38949 38949->38855 38951 760658b ReadProcessMemory 38950->38951 38953 76065fa 38950->38953 38952 76065af 38951->38952 38952->38855 38953->38855 38955 7606228 ResumeThread 38954->38955 38957 7606259 38955->38957 38957->38878 38959 7606228 ResumeThread 38958->38959 38961 7606259 38959->38961 38961->38878 38963 76063b0 VirtualAllocEx 38962->38963 38965 76063ed 38963->38965 38965->38889 38967 76063b0 VirtualAllocEx 38966->38967 38969 76063ed 38967->38969 38969->38889 38970 7f42430 38971 7f4246a 38970->38971 38972 7f424e6 38971->38972 38973 7f424fb 38971->38973 38978 7f408a4 38972->38978 38975 7f408a4 3 API calls 38973->38975 38977 7f4250a 38975->38977 38980 7f408af 38978->38980 38979 7f424f1 38980->38979 38983 7f42e50 38980->38983 38989 7f42e41 38980->38989 38995 7f408ec 38983->38995 38985 7f42e77 38985->38979 38987 7f42e9f CreateIconFromResourceEx 38988 7f42f1e 38987->38988 38988->38979 38990 7f42e4a 38989->38990 38991 7f408ec CreateIconFromResourceEx 38990->38991 38992 7f42e77 38990->38992 38993 7f42e9f CreateIconFromResourceEx 38990->38993 38991->38990 38992->38979 38994 7f42f1e 38993->38994 38994->38979 38996 7f42ea0 CreateIconFromResourceEx 38995->38996 38997 7f42e4a 38996->38997 38997->38983 38997->38985 38997->38987 39012 2f24668 39013 2f2467a 39012->39013 39014 2f24686 39013->39014 39018 2f24778 39013->39018 39023 2f23e28 39014->39023 39016 2f246a5 39019 2f2479d 39018->39019 39027 2f24888 39019->39027 39031 2f24878 39019->39031 39024 2f23e33 39023->39024 39039 2f25d1c 39024->39039 39026 2f26ffb 39026->39016 39028 2f248af 39027->39028 39029 2f2498c 39028->39029 39035 2f244b0 39028->39035 39032 2f24888 39031->39032 39033 2f244b0 CreateActCtxA 39032->39033 39034 2f2498c 39032->39034 39033->39034 39036 2f25918 CreateActCtxA 39035->39036 39038 2f259cf 39036->39038 39040 2f25d27 39039->39040 39043 2f25d3c 39040->39043 39042 2f272b5 39042->39026 39044 2f25d47 39043->39044 39047 2f25d6c 39044->39047 39046 2f2739a 39046->39042 39048 2f25d77 39047->39048 39051 2f25d9c 39048->39051 39050 2f2748d 39050->39046 39053 2f25da7 39051->39053 39052 2f28a29 39052->39050 39054 2f289eb 39053->39054 39058 2f2ac90 39053->39058 39054->39052 39062 2f2cd90 39054->39062 39073 2f2cd81 39054->39073 39084 2f2b0d0 39058->39084 39088 2f2b0c1 39058->39088 39059 2f2aca6 39059->39054 39063 2f2cdb1 39062->39063 39064 2f2cdd5 39063->39064 39122 2f2d30d 39063->39122 39126 2f2d309 39063->39126 39130 2f2d339 39063->39130 39134 2f2d348 39063->39134 39138 2f2d305 39063->39138 39142 2f2d301 39063->39142 39146 2f2d311 39063->39146 39150 2f2d3a0 39063->39150 39064->39052 39074 2f2cdb1 39073->39074 39075 2f2cdd5 39074->39075 39076 2f2d3a0 3 API calls 39074->39076 39077 2f2d311 3 API calls 39074->39077 39078 2f2d301 3 API calls 39074->39078 39079 2f2d305 3 API calls 39074->39079 39080 2f2d348 3 API calls 39074->39080 39081 2f2d339 3 API calls 39074->39081 39082 2f2d309 3 API calls 39074->39082 39083 2f2d30d 3 API calls 39074->39083 39075->39052 39076->39075 39077->39075 39078->39075 39079->39075 39080->39075 39081->39075 39082->39075 39083->39075 39092 2f2b1c8 39084->39092 39102 2f2b1b8 39084->39102 39085 2f2b0df 39085->39059 39089 2f2b0df 39088->39089 39090 2f2b1c8 2 API calls 39088->39090 39091 2f2b1b8 2 API calls 39088->39091 39089->39059 39090->39089 39091->39089 39093 2f2b1d9 39092->39093 39097 2f2b1fc 39092->39097 39112 2f29c38 39093->39112 39096 2f2b1f4 39096->39097 39098 2f2b400 GetModuleHandleW 39096->39098 39097->39085 39099 2f2b42d 39098->39099 39099->39085 39103 2f2b1c8 39102->39103 39104 2f29c38 GetModuleHandleW 39103->39104 39106 2f2b1fc 39103->39106 39105 2f2b1e4 39104->39105 39105->39106 39110 2f2b460 GetModuleHandleW 39105->39110 39111 2f2b450 GetModuleHandleW 39105->39111 39106->39085 39107 2f2b1f4 39107->39106 39108 2f2b400 GetModuleHandleW 39107->39108 39109 2f2b42d 39108->39109 39109->39085 39110->39107 39111->39107 39113 2f2b3b8 GetModuleHandleW 39112->39113 39115 2f2b1e4 39113->39115 39115->39097 39116 2f2b450 39115->39116 39119 2f2b460 39115->39119 39117 2f29c38 GetModuleHandleW 39116->39117 39118 2f2b474 39116->39118 39117->39118 39118->39096 39120 2f29c38 GetModuleHandleW 39119->39120 39121 2f2b474 39120->39121 39121->39096 39124 2f2d2f6 39122->39124 39123 2f2d38f 39123->39064 39124->39123 39155 2f2d170 39124->39155 39128 2f2d2f6 39126->39128 39127 2f2d38f 39127->39064 39128->39127 39129 2f2d170 3 API calls 39128->39129 39129->39127 39132 2f2d2f6 39130->39132 39131 2f2d38f 39131->39064 39132->39130 39132->39131 39133 2f2d170 3 API calls 39132->39133 39133->39131 39135 2f2d355 39134->39135 39136 2f2d38f 39135->39136 39137 2f2d170 3 API calls 39135->39137 39136->39064 39137->39136 39140 2f2d2f6 39138->39140 39139 2f2d38f 39139->39064 39140->39139 39141 2f2d170 3 API calls 39140->39141 39141->39139 39144 2f2d2f6 39142->39144 39143 2f2d38f 39143->39064 39144->39143 39145 2f2d170 3 API calls 39144->39145 39145->39143 39148 2f2d2f6 39146->39148 39147 2f2d38f 39147->39064 39148->39147 39149 2f2d170 3 API calls 39148->39149 39149->39147 39151 2f2d3d5 39150->39151 39152 2f2d360 39150->39152 39151->39064 39153 2f2d170 3 API calls 39152->39153 39154 2f2d38f 39152->39154 39153->39154 39154->39064 39156 2f2d175 39155->39156 39158 2f2dca0 39156->39158 39159 2f2d28c 39156->39159 39158->39158 39160 2f2d297 39159->39160 39161 2f25d9c 3 API calls 39160->39161 39162 2f2dd0f 39161->39162 39162->39158
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1485630838.0000000007F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7f40000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 740ee235fcf7a234b47c0f33038be18180a7ea6bf71f99f7456666583a2442e7
                                                          • Instruction ID: 9759523256f371ab5fa8296fb87e8e03fa3659883ff4dee3f60d85192faf910e
                                                          • Opcode Fuzzy Hash: 740ee235fcf7a234b47c0f33038be18180a7ea6bf71f99f7456666583a2442e7
                                                          • Instruction Fuzzy Hash: EA3261B1E002159FDB14DFA8C8507AEBBB2BF85300F14856AE409AB385DF749D85CF95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1485630838.0000000007F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7f40000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6679117b8df00755482646ceeab2a44729244d9b2edc5a77fb5d2435dc080ae8
                                                          • Instruction ID: 8b1b23f4e354516bfe53b679c5589c32759e4b91ee2743873d501a41653cf948
                                                          • Opcode Fuzzy Hash: 6679117b8df00755482646ceeab2a44729244d9b2edc5a77fb5d2435dc080ae8
                                                          • Instruction Fuzzy Hash: 11C139B1E10219DFDB14CFA5C88079DBBB2FF89310F18C5AAE449AB255DB709985CF90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1d791e437c819e49fa083be8dc4caaf64b0f85953e2af45afedef2070c069fee
                                                          • Instruction ID: a39b87a996f4903b7c4cf53aa9bcedfecfdf4a2fd722994cbe22a1e50b755e05
                                                          • Opcode Fuzzy Hash: 1d791e437c819e49fa083be8dc4caaf64b0f85953e2af45afedef2070c069fee
                                                          • Instruction Fuzzy Hash: 25818053F14556DBCB21A4BE6C123AD10C2539E45CF1CEA556A55EA3D6F2E2CC00A3A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 60e9a7ed521b3cd7485125e2ad3094ce16c1047b2a19b4cf01aff0aa36b4ad01
                                                          • Instruction ID: f8653b46a1f192351792fb695fa1d1b22dcdc78f13f28f8dec88da96b199f1b9
                                                          • Opcode Fuzzy Hash: 60e9a7ed521b3cd7485125e2ad3094ce16c1047b2a19b4cf01aff0aa36b4ad01
                                                          • Instruction Fuzzy Hash: 1981A170E012199FDB08DFA9D894AEEBBB2FF88300F248129D415AB364DB355945CF90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6349d667756ae69333e9b60ee667219780f6da28e49f2e8bfe5a2de66f23816
                                                          • Instruction ID: 984340507cd50e457adfffb74d692f788d5aac1e6057e3f6cc53d4b1c7ad8df5
                                                          • Opcode Fuzzy Hash: a6349d667756ae69333e9b60ee667219780f6da28e49f2e8bfe5a2de66f23816
                                                          • Instruction Fuzzy Hash: 3381AF70E012199FDB08DFA9D894AEEBBB2FF89300F648529D405AB364DB355945CF90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3e8100aa1559a7967c93fd594abcf3d727077667cc89046110b2a98d5f40620b
                                                          • Instruction ID: e09463cd53359c8d264865c11214dd34ca43461a38f857da7e65f03b53da5171
                                                          • Opcode Fuzzy Hash: 3e8100aa1559a7967c93fd594abcf3d727077667cc89046110b2a98d5f40620b
                                                          • Instruction Fuzzy Hash: 0021DDB1D156588BEB1CCFA7C8443EEFBF6AF8A300F04C16AD40966255DB7505468F90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 450bde4fb1eefe69b337a93824d9535660b2d097511604df767eca72465fb047
                                                          • Instruction ID: 0256b02a7a937df8a76ec0d6192c5438c3a7513649767d9e280eb9652865da54
                                                          • Opcode Fuzzy Hash: 450bde4fb1eefe69b337a93824d9535660b2d097511604df767eca72465fb047
                                                          • Instruction Fuzzy Hash: E721A8B1D146588BEB1CCF97C8457EEFAF6BFCA300F14C169D40A662A4EB7509468F90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 7606ae4-7606ae8 1 7606aea-7606b85 0->1 2 7606a7d-7606aaa 0->2 7 7606b87-7606b91 1->7 8 7606bbe-7606bde 1->8 9 7606ab3-7606ad8 2->9 10 7606aac-7606ab2 2->10 7->8 11 7606b93-7606b95 7->11 18 7606be0-7606bea 8->18 19 7606c17-7606c46 8->19 10->9 12 7606b97-7606ba1 11->12 13 7606bb8-7606bbb 11->13 15 7606ba3 12->15 16 7606ba5-7606bb4 12->16 13->8 15->16 16->16 21 7606bb6 16->21 18->19 22 7606bec-7606bee 18->22 27 7606c48-7606c52 19->27 28 7606c7f-7606d39 CreateProcessA 19->28 21->13 24 7606bf0-7606bfa 22->24 25 7606c11-7606c14 22->25 29 7606bfc 24->29 30 7606bfe-7606c0d 24->30 25->19 27->28 31 7606c54-7606c56 27->31 41 7606d42-7606dc8 28->41 42 7606d3b-7606d41 28->42 29->30 30->30 32 7606c0f 30->32 33 7606c58-7606c62 31->33 34 7606c79-7606c7c 31->34 32->25 36 7606c64 33->36 37 7606c66-7606c75 33->37 34->28 36->37 37->37 38 7606c77 37->38 38->34 52 7606dd8-7606ddc 41->52 53 7606dca-7606dce 41->53 42->41 55 7606dec-7606df0 52->55 56 7606dde-7606de2 52->56 53->52 54 7606dd0 53->54 54->52 58 7606e00-7606e04 55->58 59 7606df2-7606df6 55->59 56->55 57 7606de4 56->57 57->55 60 7606e16-7606e1d 58->60 61 7606e06-7606e0c 58->61 59->58 62 7606df8 59->62 63 7606e34 60->63 64 7606e1f-7606e2e 60->64 61->60 62->58 66 7606e35 63->66 64->63 66->66
                                                          APIs
                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07606D26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: CreateProcess
                                                          • String ID:
                                                          • API String ID: 963392458-0
                                                          • Opcode ID: 5d39118d3a9f96556555f77c8a30f45c8e1d4d7c52d91549256f3359ee150124
                                                          • Instruction ID: d4fa8105e9d87bc87ded5dc5856a003fbf22b690726371587b333d96fca6c9f2
                                                          • Opcode Fuzzy Hash: 5d39118d3a9f96556555f77c8a30f45c8e1d4d7c52d91549256f3359ee150124
                                                          • Instruction Fuzzy Hash: 22B18BB1D0021ADFEB24DFA8C8407EEBBB2FF45310F148569D849A7280DB7599A5CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 67 7606af0-7606b85 69 7606b87-7606b91 67->69 70 7606bbe-7606bde 67->70 69->70 71 7606b93-7606b95 69->71 77 7606be0-7606bea 70->77 78 7606c17-7606c46 70->78 72 7606b97-7606ba1 71->72 73 7606bb8-7606bbb 71->73 75 7606ba3 72->75 76 7606ba5-7606bb4 72->76 73->70 75->76 76->76 79 7606bb6 76->79 77->78 80 7606bec-7606bee 77->80 84 7606c48-7606c52 78->84 85 7606c7f-7606d39 CreateProcessA 78->85 79->73 82 7606bf0-7606bfa 80->82 83 7606c11-7606c14 80->83 86 7606bfc 82->86 87 7606bfe-7606c0d 82->87 83->78 84->85 88 7606c54-7606c56 84->88 98 7606d42-7606dc8 85->98 99 7606d3b-7606d41 85->99 86->87 87->87 89 7606c0f 87->89 90 7606c58-7606c62 88->90 91 7606c79-7606c7c 88->91 89->83 93 7606c64 90->93 94 7606c66-7606c75 90->94 91->85 93->94 94->94 95 7606c77 94->95 95->91 109 7606dd8-7606ddc 98->109 110 7606dca-7606dce 98->110 99->98 112 7606dec-7606df0 109->112 113 7606dde-7606de2 109->113 110->109 111 7606dd0 110->111 111->109 115 7606e00-7606e04 112->115 116 7606df2-7606df6 112->116 113->112 114 7606de4 113->114 114->112 117 7606e16-7606e1d 115->117 118 7606e06-7606e0c 115->118 116->115 119 7606df8 116->119 120 7606e34 117->120 121 7606e1f-7606e2e 117->121 118->117 119->115 123 7606e35 120->123 121->120 123->123
                                                          APIs
                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07606D26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: CreateProcess
                                                          • String ID:
                                                          • API String ID: 963392458-0
                                                          • Opcode ID: f706f5d2720b19e193889ccdc0d2cebaab1cdd8cd5662c6eb253362e40a1b9ef
                                                          • Instruction ID: b141bf972028882faf08fccdb8f09697f0a65e8ee7aa936ae2ee1ac38444596b
                                                          • Opcode Fuzzy Hash: f706f5d2720b19e193889ccdc0d2cebaab1cdd8cd5662c6eb253362e40a1b9ef
                                                          • Instruction Fuzzy Hash: 5E916BB1D0021ADFEB24DF68C8407EEBBB2FF45310F148169D859A7280DB7599A5CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 124 2f2b1c8-2f2b1d7 125 2f2b203-2f2b207 124->125 126 2f2b1d9-2f2b1e6 call 2f29c38 124->126 127 2f2b21b-2f2b25c 125->127 128 2f2b209-2f2b213 125->128 133 2f2b1e8 126->133 134 2f2b1fc 126->134 135 2f2b269-2f2b277 127->135 136 2f2b25e-2f2b266 127->136 128->127 179 2f2b1ee call 2f2b460 133->179 180 2f2b1ee call 2f2b450 133->180 134->125 137 2f2b29b-2f2b29d 135->137 138 2f2b279-2f2b27e 135->138 136->135 141 2f2b2a0-2f2b2a7 137->141 142 2f2b280-2f2b287 call 2f2ae80 138->142 143 2f2b289 138->143 139 2f2b1f4-2f2b1f6 139->134 140 2f2b338-2f2b3f8 139->140 174 2f2b400-2f2b42b GetModuleHandleW 140->174 175 2f2b3fa-2f2b3fd 140->175 145 2f2b2b4-2f2b2bb 141->145 146 2f2b2a9-2f2b2b1 141->146 144 2f2b28b-2f2b299 142->144 143->144 144->141 148 2f2b2c8-2f2b2d1 call 2f2ae90 145->148 149 2f2b2bd-2f2b2c5 145->149 146->145 155 2f2b2d3-2f2b2db 148->155 156 2f2b2de-2f2b2e3 148->156 149->148 155->156 157 2f2b301-2f2b30e 156->157 158 2f2b2e5-2f2b2ec 156->158 164 2f2b310-2f2b32e 157->164 165 2f2b331-2f2b337 157->165 158->157 160 2f2b2ee-2f2b2fe call 2f2aea0 call 2f2aeb0 158->160 160->157 164->165 176 2f2b434-2f2b448 174->176 177 2f2b42d-2f2b433 174->177 175->174 177->176 179->139 180->139
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 952753465dbbb76e0449b8d2d4bbab40c0fda7e7b36aef1fe908c13d399dd4fa
                                                          • Instruction ID: 505438541c4c9d62fcfb9480ac837aa47020c6c3a2a7e52ce29049ea20be8782
                                                          • Opcode Fuzzy Hash: 952753465dbbb76e0449b8d2d4bbab40c0fda7e7b36aef1fe908c13d399dd4fa
                                                          • Instruction Fuzzy Hash: 46714670A00B158FD724CF6AD55475ABBF2FF89248F00892DD58AD7A40DB74E849CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 181 76065f0-76065f8 182 76065fa-760662f 181->182 183 760658b-76065ad ReadProcessMemory 181->183 187 7606631 182->187 188 7606636-760668f 182->188 185 76065b6-76065e6 183->185 186 76065af-76065b5 183->186 186->185 187->188 189 76067a2-76067b3 188->189 190 7606695-7606697 188->190 193 76067b5-76067b7 189->193 194 760682b-760683c 189->194 190->189 195 760669d-76066cd 190->195 193->194 199 76067b9-76067c9 193->199 197 7606842-7606844 194->197 198 7606a1b-7606a25 194->198 200 76066d4-76066e5 195->200 201 76066cf 195->201 197->198 202 760684a-760687a 197->202 203 76067da 199->203 204 76067cb-76067d8 199->204 205 76066e7 200->205 206 76066ec-7606702 200->206 201->200 209 7606881-7606892 202->209 210 760687c 202->210 211 76067dd-7606818 203->211 204->211 205->206 207 7606704 206->207 208 7606709-760671f 206->208 207->208 212 7606721 208->212 213 7606726-7606781 208->213 214 7606894 209->214 215 7606899-76068af 209->215 210->209 229 760681a 211->229 230 760681f-7606826 211->230 212->213 238 7606783-7606789 213->238 239 760678b 213->239 214->215 217 76068b1 215->217 218 76068b6-76068cc 215->218 217->218 221 76068d3-7606910 218->221 222 76068ce 218->222 223 7606912 221->223 224 7606917-7606928 221->224 222->221 223->224 226 760692a 224->226 227 760692f-7606945 224->227 226->227 231 7606947 227->231 232 760694c-7606962 227->232 229->230 230->198 231->232 233 7606964 232->233 234 7606969-7606988 232->234 233->234 236 7606992 234->236 237 760698a-7606990 234->237 240 7606995-7606a03 236->240 237->240 241 760678e-760679d 238->241 239->241 248 7606a05-7606a0b 240->248 249 7606a0d 240->249 241->198 250 7606a10-7606a18 248->250 249->250 250->198
                                                          APIs
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 076065A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessRead
                                                          • String ID:
                                                          • API String ID: 1726664587-0
                                                          • Opcode ID: 45db0bf45db1981745d3698fd065f526c25951732b072f189b34c112f32a9c17
                                                          • Instruction ID: 89c931244a21dc43ee2f26a51ddfdede8be8b8e99d7ac68728b520a00c305c99
                                                          • Opcode Fuzzy Hash: 45db0bf45db1981745d3698fd065f526c25951732b072f189b34c112f32a9c17
                                                          • Instruction Fuzzy Hash: 1C615AB1E002198FDB18CFA9D5406AEFBB2FF89310F24816AD419BB356D7359941CFA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 252 2f2590c-2f25913 253 2f25918-2f259d9 CreateActCtxA 252->253 255 2f259e2-2f25a3c 253->255 256 2f259db-2f259e1 253->256 263 2f25a4b-2f25a4f 255->263 264 2f25a3e-2f25a41 255->264 256->255 265 2f25a60-2f25a90 263->265 266 2f25a51-2f25a5d 263->266 264->263 270 2f25a42-2f25a4a 265->270 271 2f25a92-2f25b14 265->271 266->265 270->263 274 2f259cf-2f259d9 270->274 274->255 274->256
                                                          APIs
                                                          • CreateActCtxA.KERNEL32(?), ref: 02F259C9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: 24420c5954088d8518f35332f2c55a45fc9c8562919dd3aa18b79d86e9e12fdd
                                                          • Instruction ID: 3cfe8ea9292f4388afed8cce2a661b93e75157d2248850752469c719b08bd7fd
                                                          • Opcode Fuzzy Hash: 24420c5954088d8518f35332f2c55a45fc9c8562919dd3aa18b79d86e9e12fdd
                                                          • Instruction Fuzzy Hash: 74410371C00728CFEB24CFA9C885BCEBBB5BF49704F60806AD408AB251DB716949CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 275 2f244b0-2f259d9 CreateActCtxA 278 2f259e2-2f25a3c 275->278 279 2f259db-2f259e1 275->279 286 2f25a4b-2f25a4f 278->286 287 2f25a3e-2f25a41 278->287 279->278 288 2f25a60-2f25a90 286->288 289 2f25a51-2f25a5d 286->289 287->286 293 2f25a42-2f25a4a 288->293 294 2f25a92-2f25b14 288->294 289->288 293->286 297 2f259cf-2f259d9 293->297 297->278 297->279
                                                          APIs
                                                          • CreateActCtxA.KERNEL32(?), ref: 02F259C9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: 0b620bdbea50252fc6241d5f88be3b0a34d360ef7776df78f1d84e79fc7faedc
                                                          • Instruction ID: 72d13ee3290c2e2c1f52b1c59a75f06edfeee972d60db72d733b9c2011654211
                                                          • Opcode Fuzzy Hash: 0b620bdbea50252fc6241d5f88be3b0a34d360ef7776df78f1d84e79fc7faedc
                                                          • Instruction Fuzzy Hash: 8C41F271D01729CBEB24CFA9C884B9EBBF5BF49714F60806AD408AB251DB716949CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 298 7f42e50-7f42e65 call 7f408ec 300 7f42e6a-7f42e75 298->300 301 7f42e77-7f42e87 300->301 302 7f42e8a-7f42e9d 300->302 305 7f42e9f-7f42f1c CreateIconFromResourceEx 302->305 306 7f42e4a-7f42e4f 302->306 307 7f42f25-7f42f42 305->307 308 7f42f1e-7f42f24 305->308 306->298 308->307
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1485630838.0000000007F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7f40000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: CreateFromIconResource
                                                          • String ID:
                                                          • API String ID: 3668623891-0
                                                          • Opcode ID: 3a70b78da51356a5c03896e4dcc71d1a9a38feadd0122e35d6eda4d61fc0147e
                                                          • Instruction ID: 0c540dd7f450efce51e8e1bf119e20053e7047874ad74e4be2211d44a947a9eb
                                                          • Opcode Fuzzy Hash: 3a70b78da51356a5c03896e4dcc71d1a9a38feadd0122e35d6eda4d61fc0147e
                                                          • Instruction Fuzzy Hash: 98316AB69002499FDB118FA9D804BEABFF8EF09210F18845AF954A7221D3399854DFA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 311 7606428-760647e 314 7606480-760648c 311->314 315 760648e-76064cd WriteProcessMemory 311->315 314->315 317 76064d6-7606506 315->317 318 76064cf-76064d5 315->318 318->317
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 076064C0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 115ebd5bac353b37b83b4b4c93fe2e521e8e89f4f527e9bcc5ef19b0a3c19c02
                                                          • Instruction ID: 9bae8e40ce33d05847f5b0d0e892726bcb9bb962a76383da5642aabc69cde015
                                                          • Opcode Fuzzy Hash: 115ebd5bac353b37b83b4b4c93fe2e521e8e89f4f527e9bcc5ef19b0a3c19c02
                                                          • Instruction Fuzzy Hash: 352146B29003199FDB10DFA9C880BDEBBF1FF48310F10882AE959A7240D7789955CBA4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 322 7606430-760647e 324 7606480-760648c 322->324 325 760648e-76064cd WriteProcessMemory 322->325 324->325 327 76064d6-7606506 325->327 328 76064cf-76064d5 325->328 328->327
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 076064C0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: abbab20ef7e7d1c313058bcd387fc9a2a97ad89c9e813b65f3da8f9b9da17f8e
                                                          • Instruction ID: 6bedc7b183bf1b07be4bb004c1b942b4f6fb7d00faf7becf59d052a4091956be
                                                          • Opcode Fuzzy Hash: abbab20ef7e7d1c313058bcd387fc9a2a97ad89c9e813b65f3da8f9b9da17f8e
                                                          • Instruction Fuzzy Hash: 6E2124B19003599FDB14CFAAC881BDEBBF5FF48310F14882AE919A7240C7789954CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 332 7606518-76065ad ReadProcessMemory 336 76065b6-76065e6 332->336 337 76065af-76065b5 332->337 337->336
                                                          APIs
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 076065A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessRead
                                                          • String ID:
                                                          • API String ID: 1726664587-0
                                                          • Opcode ID: 6d8f22931ae1ef95de3ce176aabe604551931f2101992e81a599bf054778509a
                                                          • Instruction ID: ce3f87c6d0fdecac153d61087ecce5f4fe7e3a4c42dbb1419d1fd1d8422a0e1c
                                                          • Opcode Fuzzy Hash: 6d8f22931ae1ef95de3ce176aabe604551931f2101992e81a599bf054778509a
                                                          • Instruction Fuzzy Hash: EA2136B2C003599FDB14CFAAD881BEEBBF5FF48310F14842AE519A7240C7399951CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 341 7606290-76062e3 343 76062f3-7606323 Wow64SetThreadContext 341->343 344 76062e5-76062f1 341->344 346 7606325-760632b 343->346 347 760632c-760635c 343->347 344->343 346->347
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07606316
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 4b57630380a816e74b2e47110e4aa475c8ab3a4e639952b63e0a6f541fc90ee6
                                                          • Instruction ID: d7320834fe625e9a5b35d55fa642611179d07d9784b6b6ab2e4d6efdfae7e88d
                                                          • Opcode Fuzzy Hash: 4b57630380a816e74b2e47110e4aa475c8ab3a4e639952b63e0a6f541fc90ee6
                                                          • Instruction Fuzzy Hash: CC2123B2D003099FDB14DFAAC4847EEBBF4EF88220F14842AD419A7241CB789945CBA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 351 2f2b0b4-2f2d73c DuplicateHandle 353 2f2d745-2f2d762 351->353 354 2f2d73e-2f2d744 351->354 354->353
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F2D66E,?,?,?,?,?), ref: 02F2D72F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: fdf1b6a070854c0d3d973265435a1a7e39b175e99e206e1e5f1b93f8635b0ee9
                                                          • Instruction ID: 7b69cfcc1128bd6c89b726487223908628e2970e1e7995ed861b4b4389a6e4e6
                                                          • Opcode Fuzzy Hash: fdf1b6a070854c0d3d973265435a1a7e39b175e99e206e1e5f1b93f8635b0ee9
                                                          • Instruction Fuzzy Hash: C221E6B5D00258EFDB10CF9AD484ADEBBF4FB48310F14841AE918A7310D378A954CFA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 357 7606298-76062e3 359 76062f3-7606323 Wow64SetThreadContext 357->359 360 76062e5-76062f1 357->360 362 7606325-760632b 359->362 363 760632c-760635c 359->363 360->359 362->363
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07606316
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 8969742592f14bf509695299e3428be5ac260e977af90e18edccd8997918e558
                                                          • Instruction ID: 4a9f46e263b41f049102f7dec5909498eb5170a40d38f1af28b2295dec48874e
                                                          • Opcode Fuzzy Hash: 8969742592f14bf509695299e3428be5ac260e977af90e18edccd8997918e558
                                                          • Instruction Fuzzy Hash: 242115B1D003099FDB14DFAAC4857AEBBF4EF49210F54842AD419A7241CB789945CFA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 367 7606520-76065ad ReadProcessMemory 371 76065b6-76065e6 367->371 372 76065af-76065b5 367->372 372->371
                                                          APIs
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 076065A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessRead
                                                          • String ID:
                                                          • API String ID: 1726664587-0
                                                          • Opcode ID: b57f4e18b8c956d6a190573ebd68154be8734dda6e185c3eede102cb22f6fc90
                                                          • Instruction ID: a5ef537cc55d8b557bfab0abc0e94e1ca99a5e46e157378ab9b1076eb751708b
                                                          • Opcode Fuzzy Hash: b57f4e18b8c956d6a190573ebd68154be8734dda6e185c3eede102cb22f6fc90
                                                          • Instruction Fuzzy Hash: 672128B1C003499FDB10CFAAC841BDEBBF5FF48310F14842AE519A7240C7799510CBA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 376 2f2d6a1-2f2d73c DuplicateHandle 377 2f2d745-2f2d762 376->377 378 2f2d73e-2f2d744 376->378 378->377
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F2D66E,?,?,?,?,?), ref: 02F2D72F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 43b97ef864a50dd8cbab0eed9883080dfc720a97ce6da9c23e5fe9e9bd263c3d
                                                          • Instruction ID: 743c4b7c098e894a1bd29f0bdb432183299aa78297f3a161826f3896da0000f8
                                                          • Opcode Fuzzy Hash: 43b97ef864a50dd8cbab0eed9883080dfc720a97ce6da9c23e5fe9e9bd263c3d
                                                          • Instruction Fuzzy Hash: FE21C2B5D00258EFDB10CFAAD984ADEBBF8EB48314F14841AE918A7350D378A954CF65
                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 076063DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: e25a5175828b74b11f100416839c7b82222b2f860c65fbc86ea85c4d4af37372
                                                          • Instruction ID: 20fe5d05731e6936df4cd67f7e2930d4732d416fd86babc63cf4621c393ecbe7
                                                          • Opcode Fuzzy Hash: e25a5175828b74b11f100416839c7b82222b2f860c65fbc86ea85c4d4af37372
                                                          • Instruction Fuzzy Hash: C2118972900249DFDB14CFA9D8447DFBBF1EF48310F14881AE515A7250C7359550CFA0
                                                          APIs
                                                          • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,07F42E6A,?,?,?,?,?), ref: 07F42F0F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1485630838.0000000007F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7f40000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: CreateFromIconResource
                                                          • String ID:
                                                          • API String ID: 3668623891-0
                                                          • Opcode ID: a7f70ab688c138eac316bd12beca94a8cda20a1b4569be6a5736c899c8042163
                                                          • Instruction ID: c4e97639513f74c9a6300600628e95ffae2fbe2c4c02cc392b05e74290431729
                                                          • Opcode Fuzzy Hash: a7f70ab688c138eac316bd12beca94a8cda20a1b4569be6a5736c899c8042163
                                                          • Instruction Fuzzy Hash: C71117B59002499FDB10CFAAD844BDEBFF8EB48320F54841AE914A7210C375A950CFA5
                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 076063DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 72a00c4e016ff0c033b6ae4936af412e107dca49aff5c3ed63200ef72fd65014
                                                          • Instruction ID: e376db93ae6fa6ba4ab5ffb41c4f3e3ccc39d2aeccc5bcaa770b422fd951177b
                                                          • Opcode Fuzzy Hash: 72a00c4e016ff0c033b6ae4936af412e107dca49aff5c3ed63200ef72fd65014
                                                          • Instruction Fuzzy Hash: 6B1126728002499FDB14DFAAC844BDFBBF5EF48310F148819E519A7250C7759950CBA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: d9b20f6549ccb6a6ed9cec1e82db98483e7c3ef9dd47fe86fde5162b86c11369
                                                          • Instruction ID: dc3deff71ebc773d4b0e04810c0616b94eec21645cafc998f12ad3eddad1cc74
                                                          • Opcode Fuzzy Hash: d9b20f6549ccb6a6ed9cec1e82db98483e7c3ef9dd47fe86fde5162b86c11369
                                                          • Instruction Fuzzy Hash: E31113B1D002498FDB24DFAAD4457EEBBF5EB88220F24881AD519A7240C679A941CBA5
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,02F2B1E4), ref: 02F2B41E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 60f7438243a5d6aead834b0bc70197570fb7d83ebb01d853e77ccb0fc7cb4861
                                                          • Instruction ID: bff06fb4cbc26f8ffa5c9b55df4ba2baa67762e642c0f6418bfd35cf97e21786
                                                          • Opcode Fuzzy Hash: 60f7438243a5d6aead834b0bc70197570fb7d83ebb01d853e77ccb0fc7cb4861
                                                          • Instruction Fuzzy Hash: 661132B2C007488FCB10CF9AC544BDEFBF4EB48218F14845AD918A7300C375A505CFA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: 66b14a1f2570049dcac8336e3337820d645654a5243bda48130a6c1286866182
                                                          • Instruction ID: 55b727f852130b57577706b6265ad430986325b07ffa6d92670f94d3f90a159d
                                                          • Opcode Fuzzy Hash: 66b14a1f2570049dcac8336e3337820d645654a5243bda48130a6c1286866182
                                                          • Instruction Fuzzy Hash: 461136B1D003498FDB24DFAAC44579FFBF4EF88220F24881AD419A7240CB79A940CBA5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0760A8FD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 90cb86c0a166a832a0a5969e94438570b4c5fcbc668434c59b07ceb4e10c6cbe
                                                          • Instruction ID: 3ce85e896def10a88571316ccdd4823af5688b8a33c0f8b08c772c695d2267c3
                                                          • Opcode Fuzzy Hash: 90cb86c0a166a832a0a5969e94438570b4c5fcbc668434c59b07ceb4e10c6cbe
                                                          • Instruction Fuzzy Hash: 0011F2B5800349DFDB20DF9AD884BDFBBF8EB48320F10841AE919A7240D375A944CFA1
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0760A8FD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: c61c8dba0fda87d45aaf8eb62e0b673525219dad546b547a726d32aed2feacd8
                                                          • Instruction ID: 3fbf186b83f68592199eec80841ed959a1044941cf296d2d1bcae097e1472d32
                                                          • Opcode Fuzzy Hash: c61c8dba0fda87d45aaf8eb62e0b673525219dad546b547a726d32aed2feacd8
                                                          • Instruction Fuzzy Hash: 7711D3B5900349DFDB20DF9AD845BEEFBF8EB48320F10845AE519A7650C375A944CFA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1465658507.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_163d000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ca83ffa7ff27f3ca28d37876d8c0c65af013e99a9ac12fc930d66222f90bee6c
                                                          • Instruction ID: fd378ee2a47467814a69e0ea879edc5a1d50dab3b539ba2cbe301a44b937a677
                                                          • Opcode Fuzzy Hash: ca83ffa7ff27f3ca28d37876d8c0c65af013e99a9ac12fc930d66222f90bee6c
                                                          • Instruction Fuzzy Hash: EC212271504204EFDB01DFA4D9C0B26BBA1FBC4328F60C5ADEA094B342C336D806CA62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1465658507.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_163d000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 38a2e68ba31523b5d56a9b6d9570925a1933a70498506be3dbfe190f8e26a4a2
                                                          • Instruction ID: f82c2aa9c55cfb78a91a35c9e327e8d5a1212476d056718566d9a2a6dd0737b5
                                                          • Opcode Fuzzy Hash: 38a2e68ba31523b5d56a9b6d9570925a1933a70498506be3dbfe190f8e26a4a2
                                                          • Instruction Fuzzy Hash: 832100B1604204EFDB15DFA4D880B26FBA5FBC4A14F60C569E84A0B386C336D847CA62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1465658507.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_163d000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction ID: 5867b4189c6cb22bb48df28f777c3e6042fdffcaead7e5506d1ee6b91806e252
                                                          • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction Fuzzy Hash: D711BB75904280DFCB12CF54D9C4B15FFA2FB84714F24C6AAD8494B796C33AD44ACBA2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1465658507.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_163d000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction ID: 47e79b63b41ec450882faf4e92deed776d3a25c2b49076f71401f4f470171107
                                                          • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction Fuzzy Hash: 3811BB75904280DFCB02CF54C9C0B15FFA1FB84224F24C6A9D9494B797C33AD44ACB62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1465520361.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_162d000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c7b841aa840817d04f881d6789fa42991fe8b26d83b4197a2eaa34fc52ba0052
                                                          • Instruction ID: 226e6427b96d93c084be1a6d64ef163c6dc4a71c6b55d0627baadff5c54c7f65
                                                          • Opcode Fuzzy Hash: c7b841aa840817d04f881d6789fa42991fe8b26d83b4197a2eaa34fc52ba0052
                                                          • Instruction Fuzzy Hash: 8201F771404B94AAF7204EA9CC84B76BB98EF41760F04C51AED080E282C33D9401CEB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1465520361.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_162d000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ff8c7366339dd723d7d2db1276ecd24af77370f0fe93d1ca7409421336bf5437
                                                          • Instruction ID: 8f89ca37022fd300296265626cb0f0893e536cca3fc06f9a16a1f0996cbd5bd8
                                                          • Opcode Fuzzy Hash: ff8c7366339dd723d7d2db1276ecd24af77370f0fe93d1ca7409421336bf5437
                                                          • Instruction Fuzzy Hash: CAF06272404794AEE7108E59DC84B62FFD8EB41734F18C55AED484A287C3799844CFB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c055e41c812e97b724b0a3b8c4ec58c280a2b7473abcf00a69b0f4b1390b6c76
                                                          • Instruction ID: 39e3ed6a0eef97f656c2da6dbe8fff77634088d154dbdf9f960025b26a5e41ec
                                                          • Opcode Fuzzy Hash: c055e41c812e97b724b0a3b8c4ec58c280a2b7473abcf00a69b0f4b1390b6c76
                                                          • Instruction Fuzzy Hash: 8DE12CB4E002598FDB24CFA9C580AAEBBB2FF89301F248169D555AB355DB349D41CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 137d78188e9ce52f37c6b6657dadd6c4c6d4b3df84135401b1851ceadca47f14
                                                          • Instruction ID: d706dd7372367594cec09f502d4f2af47c37b0647f8c38583153deb5704fff4d
                                                          • Opcode Fuzzy Hash: 137d78188e9ce52f37c6b6657dadd6c4c6d4b3df84135401b1851ceadca47f14
                                                          • Instruction Fuzzy Hash: 1FE11AB4E002198FDB18DFA9C580AAEFBB2FF89305F248169D455AB355D734AD41CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5fa7aafb7321ba0f430e4b9904480c9c3337dba26e34c4a9b041372c2d29b9c8
                                                          • Instruction ID: bd09c3f16ada4961ad3a3bd2b27daddd57124c50cee4e9acc4a8bc186d448420
                                                          • Opcode Fuzzy Hash: 5fa7aafb7321ba0f430e4b9904480c9c3337dba26e34c4a9b041372c2d29b9c8
                                                          • Instruction Fuzzy Hash: 36E14FB4E002598FDB24CFA9C5809AEFBB2FF89301F248169D505AB355DB349D41CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 48ddee1db7755450d9c0bfeb066068238dff665e368cb48dec84e594ea3851d9
                                                          • Instruction ID: 9e73a18342de19638d8d7af627353a3154bbf6cce25ba7d80fef78e527193773
                                                          • Opcode Fuzzy Hash: 48ddee1db7755450d9c0bfeb066068238dff665e368cb48dec84e594ea3851d9
                                                          • Instruction Fuzzy Hash: 8BE12AB4E002598FDB24CFA9C5809AEFBB2FF89305F248169D515AB355DB34AD41CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a1e0d79cb27d1ca0b949d955476c6200f6aa8fccaf9a6c424d8d226c720b212e
                                                          • Instruction ID: 06ac13bbdf130e0bf815accf2737973380e316de972c5ba30c8c41b26c84f053
                                                          • Opcode Fuzzy Hash: a1e0d79cb27d1ca0b949d955476c6200f6aa8fccaf9a6c424d8d226c720b212e
                                                          • Instruction Fuzzy Hash: 0BE1ECB4E002198FDB14CFA9C5809AEFBB2FF89305F248169D456AB356D735AD41CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1467156149.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2f20000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d8191e61da18628e13ea416a4a16ff5c0fbef28520919e88d60bf07320f21486
                                                          • Instruction ID: 0989325db1008e16b20cde8d5812853815be6b6e0256851dc440a6970ce514d7
                                                          • Opcode Fuzzy Hash: d8191e61da18628e13ea416a4a16ff5c0fbef28520919e88d60bf07320f21486
                                                          • Instruction Fuzzy Hash: 6DA16F32E102198FCF15DFB4C8405DEBBB2FF86340B25456AE905AB265DB35E95ACF40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1479031587.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7600000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 977905d834489e7455f4d72f1fab3a3819afd9fa8cb0f4bbcd4de1cc5dd5e3d8
                                                          • Instruction ID: 6574ec9e5b329b6a965ecc51f3079791ef6bf1c081426794edaebe1c24b2237a
                                                          • Opcode Fuzzy Hash: 977905d834489e7455f4d72f1fab3a3819afd9fa8cb0f4bbcd4de1cc5dd5e3d8
                                                          • Instruction Fuzzy Hash: 03514DB0E002598FDB18CFAAC5805AEBBB2FF89201F248169D459BB355C7359D42CFA0

                                                          Execution Graph

                                                          Execution Coverage:12%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:26
                                                          Total number of Limit Nodes:5
                                                          execution_graph 24214 1120848 24215 112084e 24214->24215 24216 112091b 24215->24216 24219 1121382 24215->24219 24224 1121488 24215->24224 24221 1121396 24219->24221 24220 1121484 24220->24215 24221->24220 24222 1121488 GlobalMemoryStatusEx 24221->24222 24230 1127ea8 24221->24230 24222->24221 24226 1121396 24224->24226 24227 112148f 24224->24227 24225 1121484 24225->24215 24226->24225 24228 1121488 GlobalMemoryStatusEx 24226->24228 24229 1127ea8 GlobalMemoryStatusEx 24226->24229 24227->24215 24228->24226 24229->24226 24232 1127eb2 24230->24232 24231 1127ecc 24231->24221 24232->24231 24235 69bd9f0 24232->24235 24240 69bd9e0 24232->24240 24237 69bda05 24235->24237 24236 69bdc1a 24236->24231 24237->24236 24238 69bde88 GlobalMemoryStatusEx 24237->24238 24239 69bdc31 GlobalMemoryStatusEx 24237->24239 24238->24237 24239->24237 24242 69bda05 24240->24242 24241 69bdc1a 24241->24231 24242->24241 24243 69bde88 GlobalMemoryStatusEx 24242->24243 24244 69bdc31 GlobalMemoryStatusEx 24242->24244 24243->24242 24244->24242
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e467668e8b23a0314f4f281c454c913cd8acfa840f9c94e7dc23590c32c566c0
                                                          • Instruction ID: 20a9be9b3a8f5d8f01298705c9e649517f815bc54659da7b11b2ebd3e017d965
                                                          • Opcode Fuzzy Hash: e467668e8b23a0314f4f281c454c913cd8acfa840f9c94e7dc23590c32c566c0
                                                          • Instruction Fuzzy Hash: 09B17070E00229CFDF18CFA9D89179DBBF2AF88314F148529D815EB794EB749865CB81
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0fd86ddabfc087ae1daa4fded54d3ccab5cd7e0977d400fbf9b8d7509f5e6988
                                                          • Instruction ID: bf082942d412f26a4ee8d7f1cdd8fe52634dd423fbe5e1df7fcc4694c14f7b13
                                                          • Opcode Fuzzy Hash: 0fd86ddabfc087ae1daa4fded54d3ccab5cd7e0977d400fbf9b8d7509f5e6988
                                                          • Instruction Fuzzy Hash: 5F917070E10219CFDF18CFA9D8857DEBBF2BF88314F148129E415A7654EB789895CB82

                                                          Control-flow Graph

                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2708539295.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_69b0000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b9319b52903eadaf635b9c8903249285890572b5f5bc1c6beb72ff143c19d3b5
                                                          • Instruction ID: 5e5f0d6b921a0e3a0ed3025144ea60ac8d41b3bfdd96d125ac1a67f342bccfad
                                                          • Opcode Fuzzy Hash: b9319b52903eadaf635b9c8903249285890572b5f5bc1c6beb72ff143c19d3b5
                                                          • Instruction Fuzzy Hash: 08410072D007498FCB14DFB5D9403DEBBF5AFC9210F18856AD814ABB90EB789845CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 27 69bea38-69bea76 28 69bea7e-69beaac GlobalMemoryStatusEx 27->28 29 69beaae-69beab4 28->29 30 69beab5-69beadd 28->30 29->30
                                                          APIs
                                                          • GlobalMemoryStatusEx.KERNEL32 ref: 069BEA9F
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2708539295.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_69b0000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemoryStatus
                                                          • String ID:
                                                          • API String ID: 1890195054-0
                                                          • Opcode ID: 9052286a8d64ad2c6ceb0ed4bd25c7bd2ccf1da958bf3a4990277b4b4b46ede7
                                                          • Instruction ID: d530c1de68d33adbedf12607f7b6daa10575fb5240f159dd418eaf12baf5c0a3
                                                          • Opcode Fuzzy Hash: 9052286a8d64ad2c6ceb0ed4bd25c7bd2ccf1da958bf3a4990277b4b4b46ede7
                                                          • Instruction Fuzzy Hash: 7D11F3B1C006599BDB10CFAAC544BDEFBF8BF48720F15816AD818B7640D378A945CFA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1843 11286c8-11286d0 1845 11286d3-11286da 1843->1845 1847 11286dc 1845->1847 1848 112873c 1847->1848 1849 11286dd-11286ff 1847->1849 1850 1128769-112876c 1848->1850 1851 112873e-1128764 1848->1851 1874 1128739 1849->1874 1852 1128799-112879c 1850->1852 1853 112876e-1128794 1850->1853 1851->1850 1855 11287c9-11287cc 1852->1855 1856 112879e-11287c4 1852->1856 1853->1852 1858 11287f9-11287fc 1855->1858 1859 11287ce-11287f4 1855->1859 1856->1855 1862 1128829-112882c 1858->1862 1863 11287fe-1128824 1858->1863 1859->1858 1866 1128859-112885c 1862->1866 1867 112882e-1128854 1862->1867 1863->1862 1871 1128889-112888c 1866->1871 1872 112885e-1128884 1866->1872 1867->1866 1877 11288b9-11288bc 1871->1877 1878 112888e-11288b4 1871->1878 1872->1871 1874->1848 1882 11288be-11288c0 1877->1882 1883 11288cd-11288d0 1877->1883 1878->1877 2066 11288c2 call 112a01b 1882->2066 2067 11288c2 call 1129f78 1882->2067 2068 11288c2 call 1129f68 1882->2068 1890 11288d2-11288f8 1883->1890 1891 11288fd-1128900 1883->1891 1890->1891 1892 1128902-1128928 1891->1892 1893 112892d-1128930 1891->1893 1892->1893 1899 1128932-1128958 1893->1899 1900 112895d-1128960 1893->1900 1894 11288c8 1894->1883 1899->1900 1902 1128962-1128988 1900->1902 1903 112898d-1128990 1900->1903 1902->1903 1908 1128992-11289b8 1903->1908 1909 11289bd-11289c0 1903->1909 1908->1909 1911 11289c2-11289e8 1909->1911 1912 11289ed-11289f0 1909->1912 1911->1912 1917 11289f2-1128a18 1912->1917 1918 1128a1d-1128a20 1912->1918 1917->1918 1920 1128a22-1128a48 1918->1920 1921 1128a4d-1128a50 1918->1921 1920->1921 1927 1128a52-1128a78 1921->1927 1928 1128a7d-1128a80 1921->1928 1927->1928 1930 1128a82-1128aa8 1928->1930 1931 1128aad-1128ab0 1928->1931 1930->1931 1937 1128ab2-1128ad8 1931->1937 1938 1128add-1128ae0 1931->1938 1937->1938 1940 1128ae2-1128b08 1938->1940 1941 1128b0d-1128b10 1938->1941 1940->1941 1947 1128b12-1128b38 1941->1947 1948 1128b3d-1128b40 1941->1948 1947->1948 1950 1128b42-1128b68 1948->1950 1951 1128b6d-1128b70 1948->1951 1950->1951 1957 1128b72-1128b98 1951->1957 1958 1128b9d-1128ba0 1951->1958 1957->1958 1960 1128ba2-1128bc8 1958->1960 1961 1128bcd-1128bd0 1958->1961 1960->1961 1967 1128bd2-1128be8 1961->1967 1968 1128bed-1128bf0 1961->1968 1967->1968 1970 1128bf2-1128c18 1968->1970 1971 1128c1d-1128c20 1968->1971 1970->1971 1977 1128c22-1128c48 1971->1977 1978 1128c4d-1128c50 1971->1978 1977->1978 1980 1128c52-1128c5e 1978->1980 1981 1128c6b-1128c6e 1978->1981 2002 1128c66 1980->2002 1987 1128c70-1128c96 1981->1987 1988 1128c9b-1128c9e 1981->1988 1987->1988 1990 1128ca0-1128cc6 1988->1990 1991 1128ccb-1128cce 1988->1991 1990->1991 1995 1128cd0-1128cf6 1991->1995 1996 1128cfb-1128cfe 1991->1996 1995->1996 1999 1128d00-1128d26 1996->1999 2000 1128d2b-1128d2e 1996->2000 1999->2000 2005 1128d30-1128d56 2000->2005 2006 1128d5b-1128d5e 2000->2006 2002->1981 2005->2006 2009 1128d60-1128d86 2006->2009 2010 1128d8b-1128d8e 2006->2010 2009->2010 2013 1128d90-1128db6 2010->2013 2014 1128dbb-1128dbe 2010->2014 2013->2014 2018 1128dc0-1128de6 2014->2018 2019 1128deb-1128dee 2014->2019 2018->2019 2023 1128df0-1128e16 2019->2023 2024 1128e1b-1128e1e 2019->2024 2023->2024 2028 1128e20 2024->2028 2029 1128e2b-1128e2e 2024->2029 2038 1128e26 2028->2038 2033 1128e30-1128e56 2029->2033 2034 1128e5b-1128e5e 2029->2034 2033->2034 2041 1128e60-1128e86 2034->2041 2042 1128e8b-1128e8e 2034->2042 2038->2029 2041->2042 2043 1128e90-1128eb6 2042->2043 2044 1128ebb-1128ebe 2042->2044 2043->2044 2049 1128ec0-1128ee6 2044->2049 2050 1128eeb-1128eed 2044->2050 2049->2050 2052 1128ef4-1128ef7 2050->2052 2053 1128eef 2050->2053 2052->1874 2058 1128efd-1128f03 2052->2058 2053->2052 2066->1894 2067->1894 2068->1894
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 65b3cf43f31fbbd91a97b60af72760374abe138ef28316b5fce578dedff9c400
                                                          • Instruction ID: 94320a4952d558cbaa218c173b4f4fd0bbd097e791a3b1041e239a2c29eda38c
                                                          • Opcode Fuzzy Hash: 65b3cf43f31fbbd91a97b60af72760374abe138ef28316b5fce578dedff9c400
                                                          • Instruction Fuzzy Hash: D0226C317103179BDB1AAB7CE4542AC33E2FBC9764B204939E006CB755DF35E8668B82

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2069 1128720-1128737 2070 1128739-112873c 2069->2070 2072 1128769-112876c 2070->2072 2073 112873e-1128764 2070->2073 2074 1128799-112879c 2072->2074 2075 112876e-1128794 2072->2075 2073->2072 2076 11287c9-11287cc 2074->2076 2077 112879e-11287c4 2074->2077 2075->2074 2079 11287f9-11287fc 2076->2079 2080 11287ce-11287f4 2076->2080 2077->2076 2082 1128829-112882c 2079->2082 2083 11287fe-1128824 2079->2083 2080->2079 2086 1128859-112885c 2082->2086 2087 112882e-1128854 2082->2087 2083->2082 2090 1128889-112888c 2086->2090 2091 112885e-1128884 2086->2091 2087->2086 2095 11288b9-11288bc 2090->2095 2096 112888e-11288b4 2090->2096 2091->2090 2100 11288be-11288c0 2095->2100 2101 11288cd-11288d0 2095->2101 2096->2095 2284 11288c2 call 112a01b 2100->2284 2285 11288c2 call 1129f78 2100->2285 2286 11288c2 call 1129f68 2100->2286 2108 11288d2-11288f8 2101->2108 2109 11288fd-1128900 2101->2109 2108->2109 2110 1128902-1128928 2109->2110 2111 112892d-1128930 2109->2111 2110->2111 2117 1128932-1128958 2111->2117 2118 112895d-1128960 2111->2118 2112 11288c8 2112->2101 2117->2118 2120 1128962-1128988 2118->2120 2121 112898d-1128990 2118->2121 2120->2121 2126 1128992-11289b8 2121->2126 2127 11289bd-11289c0 2121->2127 2126->2127 2129 11289c2-11289e8 2127->2129 2130 11289ed-11289f0 2127->2130 2129->2130 2135 11289f2-1128a18 2130->2135 2136 1128a1d-1128a20 2130->2136 2135->2136 2138 1128a22-1128a48 2136->2138 2139 1128a4d-1128a50 2136->2139 2138->2139 2145 1128a52-1128a78 2139->2145 2146 1128a7d-1128a80 2139->2146 2145->2146 2148 1128a82-1128aa8 2146->2148 2149 1128aad-1128ab0 2146->2149 2148->2149 2155 1128ab2-1128ad8 2149->2155 2156 1128add-1128ae0 2149->2156 2155->2156 2158 1128ae2-1128b08 2156->2158 2159 1128b0d-1128b10 2156->2159 2158->2159 2165 1128b12-1128b38 2159->2165 2166 1128b3d-1128b40 2159->2166 2165->2166 2168 1128b42-1128b68 2166->2168 2169 1128b6d-1128b70 2166->2169 2168->2169 2175 1128b72-1128b98 2169->2175 2176 1128b9d-1128ba0 2169->2176 2175->2176 2178 1128ba2-1128bc8 2176->2178 2179 1128bcd-1128bd0 2176->2179 2178->2179 2185 1128bd2-1128be8 2179->2185 2186 1128bed-1128bf0 2179->2186 2185->2186 2188 1128bf2-1128c18 2186->2188 2189 1128c1d-1128c20 2186->2189 2188->2189 2195 1128c22-1128c48 2189->2195 2196 1128c4d-1128c50 2189->2196 2195->2196 2198 1128c52-1128c5e 2196->2198 2199 1128c6b-1128c6e 2196->2199 2220 1128c66 2198->2220 2205 1128c70-1128c96 2199->2205 2206 1128c9b-1128c9e 2199->2206 2205->2206 2208 1128ca0-1128cc6 2206->2208 2209 1128ccb-1128cce 2206->2209 2208->2209 2213 1128cd0-1128cf6 2209->2213 2214 1128cfb-1128cfe 2209->2214 2213->2214 2217 1128d00-1128d26 2214->2217 2218 1128d2b-1128d2e 2214->2218 2217->2218 2223 1128d30-1128d56 2218->2223 2224 1128d5b-1128d5e 2218->2224 2220->2199 2223->2224 2227 1128d60-1128d86 2224->2227 2228 1128d8b-1128d8e 2224->2228 2227->2228 2231 1128d90-1128db6 2228->2231 2232 1128dbb-1128dbe 2228->2232 2231->2232 2236 1128dc0-1128de6 2232->2236 2237 1128deb-1128dee 2232->2237 2236->2237 2241 1128df0-1128e16 2237->2241 2242 1128e1b-1128e1e 2237->2242 2241->2242 2246 1128e20 2242->2246 2247 1128e2b-1128e2e 2242->2247 2256 1128e26 2246->2256 2251 1128e30-1128e56 2247->2251 2252 1128e5b-1128e5e 2247->2252 2251->2252 2259 1128e60-1128e86 2252->2259 2260 1128e8b-1128e8e 2252->2260 2256->2247 2259->2260 2261 1128e90-1128eb6 2260->2261 2262 1128ebb-1128ebe 2260->2262 2261->2262 2267 1128ec0-1128ee6 2262->2267 2268 1128eeb-1128eed 2262->2268 2267->2268 2270 1128ef4-1128ef7 2268->2270 2271 1128eef 2268->2271 2270->2070 2276 1128efd-1128f03 2270->2276 2271->2270 2284->2112 2285->2112 2286->2112
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f3653c95c96ae4a847bb0982fa0fd3838dfd4ad85cc5af1e00457977386270c7
                                                          • Instruction ID: 76af685f89f7e0e60e5a5386b619fb1339e8769a48821c6ad2c6ac1555ca432d
                                                          • Opcode Fuzzy Hash: f3653c95c96ae4a847bb0982fa0fd3838dfd4ad85cc5af1e00457977386270c7
                                                          • Instruction Fuzzy Hash: EF126C317103179BDB19AB7CE4542AC33E2FBC9765B208938E006CB755DF75E8668B82

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2727 112a1aa-112a1b0 2728 112a1b1-112a1b4 2727->2728 2729 112a1b6-112a1c2 2728->2729 2730 112a1c7-112a1ca 2728->2730 2729->2730 2731 112a1ff-112a202 2730->2731 2732 112a1cc-112a1fa 2730->2732 2734 112a4c6-112a4cf 2731->2734 2735 112a208-112a20b 2731->2735 2732->2731 2737 112a4d5-112a4df 2734->2737 2738 112a20d-112a216 2734->2738 2735->2738 2739 112a228-112a22b 2735->2739 2740 112a4e2-112a512 2738->2740 2741 112a21c-112a223 2738->2741 2742 112a235-112a238 2739->2742 2743 112a22d-112a232 2739->2743 2759 112a514-112a517 2740->2759 2741->2739 2745 112a23a-112a256 2742->2745 2746 112a25b-112a25e 2742->2746 2743->2742 2745->2746 2747 112a260-112a26f 2746->2747 2748 112a27a-112a27c 2746->2748 2757 112a4c3 2747->2757 2758 112a275 2747->2758 2751 112a283-112a286 2748->2751 2752 112a27e 2748->2752 2751->2728 2754 112a28c-112a29a 2751->2754 2752->2751 2865 112a29d call 112a6b8 2754->2865 2866 112a29d call 112a6c8 2754->2866 2757->2734 2758->2748 2761 112a566-112a56f 2759->2761 2762 112a519-112a51c 2759->2762 2765 112a575 2761->2765 2766 112a5fd-112a606 2761->2766 2763 112a51e-112a537 2762->2763 2764 112a53c-112a53f 2762->2764 2763->2764 2770 112a561-112a564 2764->2770 2771 112a541-112a55c 2764->2771 2772 112a57a-112a57d 2765->2772 2768 112a6ab-112a6c0 2766->2768 2769 112a60c-112a610 2766->2769 2767 112a2a3-112a2bf call 112de6a 2767->2757 2794 112a2c5-112a2ca 2767->2794 2775 112a615-112a618 2769->2775 2770->2761 2770->2772 2771->2770 2776 112a598-112a59b 2772->2776 2777 112a57f-112a58d 2772->2777 2780 112a637-112a63a 2775->2780 2781 112a61a-112a632 2775->2781 2778 112a5ad-112a5b0 2776->2778 2779 112a59d 2776->2779 2790 112a63c-112a65e 2777->2790 2793 112a593 2777->2793 2787 112a5b2-112a5ca 2778->2787 2788 112a5d5-112a5d8 2778->2788 2795 112a5a5-112a5a8 2779->2795 2789 112a65f-112a662 2780->2789 2780->2790 2781->2780 2791 112a664-112a667 2787->2791 2812 112a5d0 2787->2812 2798 112a5e2-112a5e5 2788->2798 2799 112a5da-112a5dd 2788->2799 2789->2791 2792 112a66c-112a66f 2789->2792 2791->2792 2800 112a671-112a689 2792->2800 2801 112a68e-112a690 2792->2801 2793->2776 2808 112a2d2-112a2d3 2794->2808 2795->2778 2804 112a5e7-112a5ec 2798->2804 2805 112a5ef-112a5f2 2798->2805 2799->2798 2800->2801 2809 112a692 2801->2809 2810 112a697-112a69a 2801->2810 2804->2805 2806 112a6a0-112a6aa 2805->2806 2807 112a5f8-112a5fb 2805->2807 2807->2766 2807->2775 2808->2757 2814 112a2d9-112a336 2808->2814 2809->2810 2810->2759 2810->2806 2812->2788 2822 112a407-112a421 2814->2822 2823 112a33c-112a38f 2814->2823 2828 112a423-112a425 2822->2828 2842 112a391-112a3ad 2823->2842 2843 112a3af-112a3d2 call 11279d4 2823->2843 2830 112a433 2828->2830 2831 112a427-112a431 2828->2831 2832 112a438-112a43a 2830->2832 2831->2832 2834 112a4ab-112a4bd 2832->2834 2835 112a43c-112a440 2832->2835 2834->2757 2834->2814 2836 112a442-112a44f 2835->2836 2837 112a451 2835->2837 2838 112a456-112a458 2836->2838 2837->2838 2838->2834 2841 112a45a-112a45c 2838->2841 2841->2834 2844 112a45e-112a4a4 2841->2844 2854 112a3d4-112a405 2842->2854 2843->2854 2844->2834 2854->2828 2865->2767 2866->2767
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: de6ec63b5651ede9cad4a67dd12e5cd6437c52d19cf795221f6f23068de4305c
                                                          • Instruction ID: 969c34b99c1e4416116260ce1d0f575660afd03087e4b3828c01ede030aceee4
                                                          • Opcode Fuzzy Hash: de6ec63b5651ede9cad4a67dd12e5cd6437c52d19cf795221f6f23068de4305c
                                                          • Instruction Fuzzy Hash: B6E1C130B002158FDF19DB68E594AADBBB2FF89310F248569E906DB751DB35EC42CB81
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f26c15076f1acf10ab9a231c27d03c7350e3fddecdd6df9ffb9d1c692dbf0ccd
                                                          • Instruction ID: 787bfb5cb80f6f00c8074bcfbf34546f33d2675ff8a3cf8e5f7675c76e5d97aa
                                                          • Opcode Fuzzy Hash: f26c15076f1acf10ab9a231c27d03c7350e3fddecdd6df9ffb9d1c692dbf0ccd
                                                          • Instruction Fuzzy Hash: 5CA16F70E00229CFDB19CFA8D8917DDBBF1AF88314F148129D818EB754EB759865CB81
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b868c959f8b0be914014439321669eb91904354dc1d7e691ac26f201003c292b
                                                          • Instruction ID: 3638c44d37b945f68d5b8071caa647ed37e80a83bf8d0e5a6bcd76e20b77c602
                                                          • Opcode Fuzzy Hash: b868c959f8b0be914014439321669eb91904354dc1d7e691ac26f201003c292b
                                                          • Instruction Fuzzy Hash: 19918F70E10219CFDF18CFA8D8857DDBBF2BF88314F248129E415A7654EB789895CB82
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cf0f0ee103cf02cabbbf8b1a865b54cef4d696162139c740c539996954838b00
                                                          • Instruction ID: 8a04a663518f1905d71659f56074dadee7dee822be41ac161bd8d198f1df3849
                                                          • Opcode Fuzzy Hash: cf0f0ee103cf02cabbbf8b1a865b54cef4d696162139c740c539996954838b00
                                                          • Instruction Fuzzy Hash: CC717AB0E00259CFDF18CFA9D8807AEBBF2BF88714F148129E415AB654EB749851CF95
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6c4537595e1599a62f8a06043b0cff0c3777c6aa0a2e5f6dd7ea8b08397b2ac6
                                                          • Instruction ID: eb5d6c94b79cf2f95167eb4c13202e460bdccbaff6ef05f5530447e69870ae8b
                                                          • Opcode Fuzzy Hash: 6c4537595e1599a62f8a06043b0cff0c3777c6aa0a2e5f6dd7ea8b08397b2ac6
                                                          • Instruction Fuzzy Hash: B57169B0E00259CFDF18CFA9D88079EBBF2BF88714F148129E415AB654EB749851CB95
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6386f98a8f15958f27ab071e718c213cde7324a128b85277f0a1a106ef2030bf
                                                          • Instruction ID: ba967dc4c120da485ed0584735f848a74df53cdc9c86cb03aa1912b2a8af2f20
                                                          • Opcode Fuzzy Hash: 6386f98a8f15958f27ab071e718c213cde7324a128b85277f0a1a106ef2030bf
                                                          • Instruction Fuzzy Hash: 14516F347102258FDB18DB68D468BAE7BF2BF89700F2040A9E406EB3A1DB75DC51CB91
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3438abdd9d87264ffd96359843ea5009cf88ce1fbaef06a6df17929d3cc4e327
                                                          • Instruction ID: 0ee3d4814ce95ba0dcaa4289f192ca1d9cfa71a684e2a8d0664a08c521bbb92b
                                                          • Opcode Fuzzy Hash: 3438abdd9d87264ffd96359843ea5009cf88ce1fbaef06a6df17929d3cc4e327
                                                          • Instruction Fuzzy Hash: 1C514A71A00205CFDB14DFA9E884B99FBB2FF88310F14C2AAE9099B755E771D945CB90
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1cc2c9126e1f8a250e965a6dd8dab021d766e9acd8c570925d0e6fd8ddb3ed89
                                                          • Instruction ID: 24e14275b02057876097b6cb186edec578de1848f08fc18761c541be2ad93c85
                                                          • Opcode Fuzzy Hash: 1cc2c9126e1f8a250e965a6dd8dab021d766e9acd8c570925d0e6fd8ddb3ed89
                                                          • Instruction Fuzzy Hash: 2C510270E10268CFDB18CFA9C895BADBBB1BF48314F148129E815AB391D774A845CB95
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 301ab22f6240284cfb8de273c8d7bdefa94ce35abc652062fd7f450f0dcf8cf6
                                                          • Instruction ID: 885343e7c08ace6361d56a6a226096b2515e437e57aee3dd651af9a32c1a9b95
                                                          • Opcode Fuzzy Hash: 301ab22f6240284cfb8de273c8d7bdefa94ce35abc652062fd7f450f0dcf8cf6
                                                          • Instruction Fuzzy Hash: DC510170D10268CFDB18CFA9C895B9DBBF1BF48314F14852AE819AB391D774A844CF95
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9f1771e3c70e2f9e498ad1148ac5dec8f944c494773badb5af606e14d42b4bf9
                                                          • Instruction ID: 439a8082f6449fd9284fa492a5f4fbbf5c475489fc28852a33aefc6a9bdb67d2
                                                          • Opcode Fuzzy Hash: 9f1771e3c70e2f9e498ad1148ac5dec8f944c494773badb5af606e14d42b4bf9
                                                          • Instruction Fuzzy Hash: 95510A72632247CFCB06FF6DF8809997BB1B796304304896DD0448B76EDA796906CB81
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 96edfe5b56bb6bb43a5276da5dc6a6136cc9fd1f297eeb2e55af4c0b777a3dba
                                                          • Instruction ID: 5ade05fa905b73e1e8f946a756af3d52210d93814eaad79b8dddc61a45e4b9fc
                                                          • Opcode Fuzzy Hash: 96edfe5b56bb6bb43a5276da5dc6a6136cc9fd1f297eeb2e55af4c0b777a3dba
                                                          • Instruction Fuzzy Hash: EF51F932632347CFCB06FF6DF8809997BB1B796704304896DD0448B76EEA792906CB85
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bbf4aea9ee5f9292632af7a23bc36813d730e52286445e3ef8a5e2f999ac32ad
                                                          • Instruction ID: 8e0199c94cec765b81cb22c790640bc5149e595c22817a6a984016bd73e7c691
                                                          • Opcode Fuzzy Hash: bbf4aea9ee5f9292632af7a23bc36813d730e52286445e3ef8a5e2f999ac32ad
                                                          • Instruction Fuzzy Hash: 4D316E75B00216EFD705DF68D890E3AB767BBC4600F55C168E4029B299CB36EC52CB90
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5f5307ac69652a66f580df9ecff70fa86910d31e7327c0a179a6d794c8a5b693
                                                          • Instruction ID: 0fd4e78f7f45d79ae13b330092b21da0e2ba4129bfc6729e6b60e94c7708ab49
                                                          • Opcode Fuzzy Hash: 5f5307ac69652a66f580df9ecff70fa86910d31e7327c0a179a6d794c8a5b693
                                                          • Instruction Fuzzy Hash: D7316F31E1022ACFDB19DF69C4407AFB7B2FF95310F208529E805EB280DB75A851CB51
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2e2cc08fc8e3079daa5b1ec0595225bb843bd6ec4b9cc06d7f2814fa1128bba4
                                                          • Instruction ID: 43ae1000a69785f28aa2bd5b041a1d66ddc6a8cb595f6148078745f6d22bc706
                                                          • Opcode Fuzzy Hash: 2e2cc08fc8e3079daa5b1ec0595225bb843bd6ec4b9cc06d7f2814fa1128bba4
                                                          • Instruction Fuzzy Hash: 7A41E0B0D00349DFEB14DFA9C484ADEBBF5BF98314F248429E809AB250DB759945CB91
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 37321efd231b6bc5d588c4f785cd65660ff926b800d1975cdbf77ab291eeba1a
                                                          • Instruction ID: ca4447b17a93a93a2259a80699583afcb530ea967a5350860fb8ae7f1b7e8942
                                                          • Opcode Fuzzy Hash: 37321efd231b6bc5d588c4f785cd65660ff926b800d1975cdbf77ab291eeba1a
                                                          • Instruction Fuzzy Hash: D1316D31E1022ACBDB19DF68C4507AFB7B2EF95310F608529E805EB280EB759D52CB51
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e3e703560c0b15ab6e8d7fe4c80984ea46e50c601fd5ff2f59b49085c8d7ab68
                                                          • Instruction ID: 84d8079042d7ab35e9ea102aab02d4cf9d2b48447e9c1507d1f7ad11cc568d1e
                                                          • Opcode Fuzzy Hash: e3e703560c0b15ab6e8d7fe4c80984ea46e50c601fd5ff2f59b49085c8d7ab68
                                                          • Instruction Fuzzy Hash: 4D41EEB0D00348DFEB14CFA9C884A9EBBF5FF48310F248029E809AB250DB75A945CB91
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e39e4fc02afd6d34dc1d687a7b0da762f8230d421c204183acddbb576adf091c
                                                          • Instruction ID: 9fdef4f712ed0b4125811bee8aeeda84a023b62f6ee9ece3b166bd23af4199fe
                                                          • Opcode Fuzzy Hash: e39e4fc02afd6d34dc1d687a7b0da762f8230d421c204183acddbb576adf091c
                                                          • Instruction Fuzzy Hash: 2E312B30B14226CFDB5DEB78C9546AE77F2AF88644F20046CD801AB398DB3ADC51CB95
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 98eccf52fedca62421485c103b8c45466b2d8f27c80b464ab03ec78a995b2e63
                                                          • Instruction ID: 6c5ab6be9cbefa945bc46550ddc0315b7146599771ff2769af399b30c06c1dfb
                                                          • Opcode Fuzzy Hash: 98eccf52fedca62421485c103b8c45466b2d8f27c80b464ab03ec78a995b2e63
                                                          • Instruction Fuzzy Hash: D8313C30B10226CFDB59EB78C9A46AD77B2AF88244B20046CD401AB399DB3ADC51CB91
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 06fcdf36be95ae2b4dd3aa5602248f40ef9e67e49c299d86fa382b33574e2ac3
                                                          • Instruction ID: 3bf4320e038147871582dcd9cf74fc79d393a9737feddd131c7644b4eba8befd
                                                          • Opcode Fuzzy Hash: 06fcdf36be95ae2b4dd3aa5602248f40ef9e67e49c299d86fa382b33574e2ac3
                                                          • Instruction Fuzzy Hash: E931C535E1021A9BDB19CFA8D85479EF7B2FF89310F14C619E801EB741DB75A881CB90
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1ee29db739c1ea48ee0c28d766549c231af331ddc6751849e9dfc82fe4dedadd
                                                          • Instruction ID: 196e60421f136d69015640f80b34f15c3977fe872d31fb6eb39fe61d36b05227
                                                          • Opcode Fuzzy Hash: 1ee29db739c1ea48ee0c28d766549c231af331ddc6751849e9dfc82fe4dedadd
                                                          • Instruction Fuzzy Hash: 8F2191356302179FDF26EB7CF8847AD3362FB8A204F148965D006C7357EB29C8568B92
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3478be72422054b3b4268eab5ded716bd115403cde3e03b02cb88020fd5b6a75
                                                          • Instruction ID: 40f33607de2e452104a54cf392a6953ca5f798c382e12eee5667908b5eda40ad
                                                          • Opcode Fuzzy Hash: 3478be72422054b3b4268eab5ded716bd115403cde3e03b02cb88020fd5b6a75
                                                          • Instruction Fuzzy Hash: 9921A635E1021A9BDB19CF68E85069EF7B2FF89310F24C619E805FB741DB759852CB90
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694128806.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_10dd000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6b3518c2f691135380483325fa62698cd3bfa774a32a95a316fdd298716f9f23
                                                          • Instruction ID: 2528add1c60b985808cbc6467739b1e43811fdf43533d9b9ffa4455d55edf529
                                                          • Opcode Fuzzy Hash: 6b3518c2f691135380483325fa62698cd3bfa774a32a95a316fdd298716f9f23
                                                          • Instruction Fuzzy Hash: 54219E7550D3C49FC703CB64C890711BF71AB86214F29C5DBD9888F2A3C23A980ACB62
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 67b73e1d630e711b12df57cc044a581826fe22486cc70d013f01bbdac8488d7f
                                                          • Instruction ID: ddaa10934f49d937603135edb323be3b9c225e38ea6f93cbd3090d3394c5d06c
                                                          • Opcode Fuzzy Hash: 67b73e1d630e711b12df57cc044a581826fe22486cc70d013f01bbdac8488d7f
                                                          • Instruction Fuzzy Hash: D4217731E003299BCB19CF68D450ADEFBB2EF89314F24851AE816FB741DB759846CB51
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: eb50ac234a58a0ef1ab3090ad8c471988cc3d6e2a0687be2e1d2f0bf35cfbda7
                                                          • Instruction ID: ec2b8b74d00549660ec53bc5faf9024d08473e8429ab6cf3d6a6cc8d283a5707
                                                          • Opcode Fuzzy Hash: eb50ac234a58a0ef1ab3090ad8c471988cc3d6e2a0687be2e1d2f0bf35cfbda7
                                                          • Instruction Fuzzy Hash: 7B21E471A002669FCF2AEFBCD4502AD77E5EB49224F1404B9D80ADB301EB35C95287D2
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3e913e02ae0d6ee680e25d0084e22fe39ce13ed96dbb502568f44481b678fa27
                                                          • Instruction ID: a4efddda7fd7b282f5fa63e0044c9fb64fda85d5400f5bf9281cb449de7c8557
                                                          • Opcode Fuzzy Hash: 3e913e02ae0d6ee680e25d0084e22fe39ce13ed96dbb502568f44481b678fa27
                                                          • Instruction Fuzzy Hash: 0621F435B002148FEB18CB79D954BAD7BF6AF88710F118129E101EB7A4EBB1CC008B50
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e8b178e33778376a517cfde9ff376421c6d21d8c6b0d75d54c6c11c3f8f3392
                                                          • Instruction ID: 334d971ef7d036e75ff8a8e10e6cc63457c3f4a591b8c4df14a7bfe8346f9d99
                                                          • Opcode Fuzzy Hash: 1e8b178e33778376a517cfde9ff376421c6d21d8c6b0d75d54c6c11c3f8f3392
                                                          • Instruction Fuzzy Hash: 4D2138317182518FC71AEB78D4602AD7BB2EFCA610B1484AED046CB78ADE39DC41C792
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694128806.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_10dd000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3d0213a0bc9a109063310d0aa0e6b061f0e72e94a16fc068d43846d485dd626c
                                                          • Instruction ID: 5c09b4059f19989d064e262baea5eab075a44dc5f8fe919a22fa406e781f4036
                                                          • Opcode Fuzzy Hash: 3d0213a0bc9a109063310d0aa0e6b061f0e72e94a16fc068d43846d485dd626c
                                                          • Instruction Fuzzy Hash: 1D210071504304EFDB11DFA4D980B26BFA5FBC4314F24C5A9E9890B282C336D846CB62
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d5c0ad06c7d9ed1098b69375bb79ae8dacc3219e78c32f7f7f2cec88e2914f1d
                                                          • Instruction ID: c35df6f6dfa89e947e3d0e61a30f544888aec190d406e6ec0afe99f7263031d2
                                                          • Opcode Fuzzy Hash: d5c0ad06c7d9ed1098b69375bb79ae8dacc3219e78c32f7f7f2cec88e2914f1d
                                                          • Instruction Fuzzy Hash: 5F215E30B001158FDB58DB78C598AAD7BF2EF88704F100468E406EB369DB7A8D01CB91
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 80b062d54e310c4a72cb471652cb0c489d2e80697c6149798fe83306a9fa959d
                                                          • Instruction ID: 6150dd6bf1707340441d7304027c4a1212a5f09aa73d86c5d0e4a2119f0a9526
                                                          • Opcode Fuzzy Hash: 80b062d54e310c4a72cb471652cb0c489d2e80697c6149798fe83306a9fa959d
                                                          • Instruction Fuzzy Hash: E3213D30B042259FDF18EB68C5547AE77F2AF89344F200468D506EB394EB768D61CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 15ffe166ee4965bd7eed2d54093c7effdffa781106d89614bf39c19cac4702ab
                                                          • Instruction ID: ddf525ebf3ce0a4672d051972e273f4e1a491845dc67a3c03ff9ffe5463daa0a
                                                          • Opcode Fuzzy Hash: 15ffe166ee4965bd7eed2d54093c7effdffa781106d89614bf39c19cac4702ab
                                                          • Instruction Fuzzy Hash: F5216530E0032A9BDB1DCF68D450A9EF7B2AF89314F14851AE816FB741DB71A945CB51
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d138e503c9999ac7610e979e83df80fb23faf938c36bc9d2ce8ff0ea8cf9603c
                                                          • Instruction ID: fd3d1830317d77790d840cad9f2f92300baea6d568776074d243fd6d0279221d
                                                          • Opcode Fuzzy Hash: d138e503c9999ac7610e979e83df80fb23faf938c36bc9d2ce8ff0ea8cf9603c
                                                          • Instruction Fuzzy Hash: 44216D356302179BEF26EB7CF8847993366FB89604F108A21D006C735AEB39D8518B92
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8946b0ff368ba81f299e5704436ffad99a445851fb77e2e3ab480f3580af3a90
                                                          • Instruction ID: 7222132e3f4e33c4940b9cf23ab9763316eac20f024a57796fc2907b802a6289
                                                          • Opcode Fuzzy Hash: 8946b0ff368ba81f299e5704436ffad99a445851fb77e2e3ab480f3580af3a90
                                                          • Instruction Fuzzy Hash: B0215E31B042669FDF18EB68C5547AE77F2AF49344F20046DC506EB3A4EB768D50CB91
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 96a2bf95c09d6f877066cd8aa657f5ecda3482e59abd0ad7715c0ddc878a0e1a
                                                          • Instruction ID: f2fca6e94832f5bb28b87c5cc3a39699410c0d068dadd6816253b707b5aef748
                                                          • Opcode Fuzzy Hash: 96a2bf95c09d6f877066cd8aa657f5ecda3482e59abd0ad7715c0ddc878a0e1a
                                                          • Instruction Fuzzy Hash: 12212CB1A641519BEF3A972CE58836C7762FB03351F504869E40BC7782DB39C865C783
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c9853b9dd1e1cd0488ca1a0f7701840e39003d2d97604470aeb1a913ff0fd1f3
                                                          • Instruction ID: 0b4b5a05cb4143326b3e02497fff74427fea08614851ceb2027ff23ce1f7e24d
                                                          • Opcode Fuzzy Hash: c9853b9dd1e1cd0488ca1a0f7701840e39003d2d97604470aeb1a913ff0fd1f3
                                                          • Instruction Fuzzy Hash: 17211B30B102158FDB58EB79C958A9E7BF1EF89704F100468E406EB369DB7A9D00CB95
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c9711eb8e8a2a2f0c967892882188ba1cfc7659ba05e7665d973bd7f15c0b7c5
                                                          • Instruction ID: 56067d3d7df152580f57e58f516095ebfeeaf84a21659fa9663d210c64a8e1c7
                                                          • Opcode Fuzzy Hash: c9711eb8e8a2a2f0c967892882188ba1cfc7659ba05e7665d973bd7f15c0b7c5
                                                          • Instruction Fuzzy Hash: 62118231F102294BEF6DA6BCD44436A3255FB8A610F218A79F006DF352EBA5CC958BC1
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e151abf638f5bbe021e2ba93492a7a009a9df708efcb1877d387bb48faa3e5f6
                                                          • Instruction ID: 9cc5eabbe67ecbc065089891943dd16cb4d1f0db125acf04b82d23f56c5f953f
                                                          • Opcode Fuzzy Hash: e151abf638f5bbe021e2ba93492a7a009a9df708efcb1877d387bb48faa3e5f6
                                                          • Instruction Fuzzy Hash: 5611C631F243254BEF2E6678D54436B3251E74A210F108A3EF006DB246EBA5C8658BC2
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 57942c725c119502d6f87d9cf70ad72c2ecdf4059ca8fffe62eff34837cfe241
                                                          • Instruction ID: a524051a64fa0cb4b71405ca24a91716bd3ca0673b4e476df27c2c73712ebe87
                                                          • Opcode Fuzzy Hash: 57942c725c119502d6f87d9cf70ad72c2ecdf4059ca8fffe62eff34837cfe241
                                                          • Instruction Fuzzy Hash: 6E11E176F012639FCB11AFB8994466F7BF5AB89690F100829E906E3344EB39C811C781
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c6e9663fc5ae0eadeec554ae131b538cc710260d2527e1f8cac1e44bf98d1518
                                                          • Instruction ID: 81406339aecaaa365ca205b5dc6f12285e9bd0f08c2db6aab9478a2ec61315ec
                                                          • Opcode Fuzzy Hash: c6e9663fc5ae0eadeec554ae131b538cc710260d2527e1f8cac1e44bf98d1518
                                                          • Instruction Fuzzy Hash: 3401D8727052355FEB18AAD9F8547ABB76AFFC0B20B10892ED1184F144CBB26C21C7D4
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 59858643d3e47de714c164676d7aedb348ce22791bc94d00062433c2e0b46f63
                                                          • Instruction ID: e6a744b2adf2d46dd49eb961a87da7188705b792348ae36fd7907dbe0b8dd72b
                                                          • Opcode Fuzzy Hash: 59858643d3e47de714c164676d7aedb348ce22791bc94d00062433c2e0b46f63
                                                          • Instruction Fuzzy Hash: E6014031E002669FCB29EFBC84505AE7BF5EB49224B1505BAD805E7301E735C952CBD5
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a127dad2db00de4d0744a5ba1fdf11e932fe937611cece65d90de1bd6e1eb87d
                                                          • Instruction ID: aa0cc7c882276de698ea2fe16e2c33b97fab33eb9286eec30861fa6eb810fe50
                                                          • Opcode Fuzzy Hash: a127dad2db00de4d0744a5ba1fdf11e932fe937611cece65d90de1bd6e1eb87d
                                                          • Instruction Fuzzy Hash: 40110430A002048BDB14DFA8E8847DABBB2FFD9310F14C178CC881F696E7749905CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cff53a6883b6fc61259886ebd9cab0fca2c281aaea57e17e66397966e492f664
                                                          • Instruction ID: 7c5dc92c5d77db1e6313b2b5b297adef9bf478ee567b0cbf22637972717e3abb
                                                          • Opcode Fuzzy Hash: cff53a6883b6fc61259886ebd9cab0fca2c281aaea57e17e66397966e492f664
                                                          • Instruction Fuzzy Hash: 9C01843592024ADFCB46FBB8F9606EC7BB2FF85200F1486A9C0459B355EB351E059B51
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 76d9f12929cd4ce2c15548f6395895894edcd16bfbbd3bfaa591812331fa2af1
                                                          • Instruction ID: 3f8ff6c840de92a1da7cadfd834097b75554419bf6ba05683447527e154b3fff
                                                          • Opcode Fuzzy Hash: 76d9f12929cd4ce2c15548f6395895894edcd16bfbbd3bfaa591812331fa2af1
                                                          • Instruction Fuzzy Hash: 39F02B33A08170EFDB1ACBE894501AC7FB0EA6911171D00E7D806DB201D321D452C752
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1dc5bf06eda34beb3bc9da4a331dca07034d4ac95e04e56cf5f71e2d4f13b4b2
                                                          • Instruction ID: 68a7a2ae66e0ed9299d190e292492cee18add97af97a34283ceca9d35bb2f532
                                                          • Opcode Fuzzy Hash: 1dc5bf06eda34beb3bc9da4a331dca07034d4ac95e04e56cf5f71e2d4f13b4b2
                                                          • Instruction Fuzzy Hash: C8F0C435B40214CFCB04EB68D598A6D77B2EF89755F6488A8E5069B3A0DB35AD12CB40
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cf32d69ce02057df5e780d6ccab30986d1788cced9e145e4be3a72eed7d188b1
                                                          • Instruction ID: 7512161ce1673898faccc222ff3ad8073a564eef77e54eb4cd509d2e644132fd
                                                          • Opcode Fuzzy Hash: cf32d69ce02057df5e780d6ccab30986d1788cced9e145e4be3a72eed7d188b1
                                                          • Instruction Fuzzy Hash: DEF0EC3593020EDFDB41FBB8F9506DD77B5BB84600F1096B8C0459B255EF366E049B92
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.2694531337.0000000001120000.00000040.00000800.00020000.00000000.sdmp, Offset: 01120000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_1120000_980001672 PPR for 30887217.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9dcb16ea5e12df0e608b631c98ff28504d9250c20f4b5475b89e375aebbb76a9
                                                          • Instruction ID: bd0685755ac2c6852d7e0f68d3b11d216f733b8c0d355d8673fbbd8ebfa40ade
                                                          • Opcode Fuzzy Hash: 9dcb16ea5e12df0e608b631c98ff28504d9250c20f4b5475b89e375aebbb76a9
                                                          • Instruction Fuzzy Hash: 1EB0124110F3C01EC20352102C157C23F110B97300F35409F40C01505255074C068B17

                                                          Execution Graph

                                                          Execution Coverage:11.3%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:257
                                                          Total number of Limit Nodes:20
                                                          execution_graph 48325 7c68dc0 48326 7c68dd6 48325->48326 48327 7c68e2e 48326->48327 48329 7819431 48326->48329 48330 78193ec 48329->48330 48331 781943a 48329->48331 48335 7816290 48330->48335 48339 7816298 48330->48339 48331->48327 48332 7819423 48332->48327 48336 7816294 Wow64SetThreadContext 48335->48336 48338 7816325 48336->48338 48338->48332 48340 781629b Wow64SetThreadContext 48339->48340 48342 7816325 48340->48342 48342->48332 48343 196b0d0 48347 196b1b8 48343->48347 48352 196b1c8 48343->48352 48344 196b0df 48348 196b1fc 48347->48348 48350 196b1d9 48347->48350 48348->48344 48349 196b400 GetModuleHandleW 48351 196b42d 48349->48351 48350->48348 48350->48349 48351->48344 48353 196b1fc 48352->48353 48354 196b1d9 48352->48354 48353->48344 48354->48353 48355 196b400 GetModuleHandleW 48354->48355 48356 196b42d 48355->48356 48356->48344 48596 196d460 48597 196d4a6 GetCurrentProcess 48596->48597 48599 196d4f1 48597->48599 48600 196d4f8 GetCurrentThread 48597->48600 48599->48600 48601 196d535 GetCurrentProcess 48600->48601 48602 196d52e 48600->48602 48603 196d56b 48601->48603 48602->48601 48604 196d593 GetCurrentThreadId 48603->48604 48605 196d5c4 48604->48605 48606 7c62430 48607 7c6246a 48606->48607 48608 7c624e6 48607->48608 48609 7c624fb 48607->48609 48614 7c608a4 48608->48614 48610 7c608a4 CreateIconFromResourceEx 48609->48610 48612 7c6250a 48610->48612 48615 7c608af 48614->48615 48616 7c624f1 48615->48616 48618 7c62e41 48615->48618 48620 7c62e6a 48618->48620 48619 7c62e77 48619->48616 48620->48619 48621 7c62ea0 CreateIconFromResourceEx 48620->48621 48622 7c62f1e 48621->48622 48622->48616 48558 7819468 48561 781946b 48558->48561 48559 78195f3 48561->48559 48562 78134e0 48561->48562 48563 78196e8 PostMessageW 48562->48563 48564 7819754 48563->48564 48564->48561 48357 781710a 48359 7816f23 48357->48359 48358 7816f0c 48359->48358 48363 7818240 48359->48363 48381 78182a3 48359->48381 48400 7818250 48359->48400 48364 781824c 48363->48364 48418 7818aa1 48364->48418 48423 781917e 48364->48423 48429 781891e 48364->48429 48434 7818d5b 48364->48434 48439 78189f7 48364->48439 48444 7818657 48364->48444 48449 7818675 48364->48449 48454 7818a53 48364->48454 48460 78186d3 48364->48460 48465 7818a30 48364->48465 48470 781894d 48364->48470 48475 78189eb 48364->48475 48481 78187eb 48364->48481 48487 7818ae9 48364->48487 48493 7818986 48364->48493 48365 781828e 48365->48358 48382 781823c 48381->48382 48384 78182b0 48382->48384 48385 7818aa1 2 API calls 48382->48385 48386 7818986 2 API calls 48382->48386 48387 7818ae9 2 API calls 48382->48387 48388 78187eb 2 API calls 48382->48388 48389 78189eb 3 API calls 48382->48389 48390 781894d 2 API calls 48382->48390 48391 7818a30 2 API calls 48382->48391 48392 78186d3 2 API calls 48382->48392 48393 7818a53 2 API calls 48382->48393 48394 7818675 2 API calls 48382->48394 48395 7818657 2 API calls 48382->48395 48396 78189f7 2 API calls 48382->48396 48397 7818d5b 2 API calls 48382->48397 48398 781891e 2 API calls 48382->48398 48399 781917e 3 API calls 48382->48399 48383 781828e 48383->48358 48384->48358 48385->48383 48386->48383 48387->48383 48388->48383 48389->48383 48390->48383 48391->48383 48392->48383 48393->48383 48394->48383 48395->48383 48396->48383 48397->48383 48398->48383 48399->48383 48401 7818253 48400->48401 48403 7818aa1 2 API calls 48401->48403 48404 7818986 2 API calls 48401->48404 48405 7818ae9 2 API calls 48401->48405 48406 78187eb 2 API calls 48401->48406 48407 78189eb 3 API calls 48401->48407 48408 781894d 2 API calls 48401->48408 48409 7818a30 2 API calls 48401->48409 48410 78186d3 2 API calls 48401->48410 48411 7818a53 2 API calls 48401->48411 48412 7818675 2 API calls 48401->48412 48413 7818657 2 API calls 48401->48413 48414 78189f7 2 API calls 48401->48414 48415 7818d5b 2 API calls 48401->48415 48416 781891e 2 API calls 48401->48416 48417 781917e 3 API calls 48401->48417 48402 781828e 48402->48358 48403->48402 48404->48402 48405->48402 48406->48402 48407->48402 48408->48402 48409->48402 48410->48402 48411->48402 48412->48402 48413->48402 48414->48402 48415->48402 48416->48402 48417->48402 48419 7818aae 48418->48419 48498 78161e0 48419->48498 48502 78161e8 48419->48502 48420 78187c8 48424 7819184 48423->48424 48425 78191a7 48424->48425 48506 78165f0 48424->48506 48511 7816518 48424->48511 48515 7816520 48424->48515 48430 7818924 48429->48430 48519 7816370 48430->48519 48523 7816368 48430->48523 48431 78187c8 48435 7818bfa 48434->48435 48435->48434 48436 7818f40 48435->48436 48527 7816430 48435->48527 48531 7816428 48435->48531 48436->48365 48440 7818a07 48439->48440 48442 7816430 WriteProcessMemory 48440->48442 48443 7816428 WriteProcessMemory 48440->48443 48441 7818dd6 48442->48441 48443->48441 48445 7818660 48444->48445 48446 78187a0 48445->48446 48535 7816ae4 48445->48535 48540 7816af0 48445->48540 48446->48365 48450 7818660 48449->48450 48450->48365 48451 78187a0 48450->48451 48452 7816af0 CreateProcessA 48450->48452 48453 7816ae4 CreateProcessA 48450->48453 48451->48365 48452->48451 48453->48451 48455 7818f46 48454->48455 48457 7819431 2 API calls 48455->48457 48544 78193f8 48455->48544 48549 78193e8 48455->48549 48456 7818f5f 48457->48456 48461 78186e6 48460->48461 48462 78187a0 48461->48462 48463 7816af0 CreateProcessA 48461->48463 48464 7816ae4 CreateProcessA 48461->48464 48462->48365 48463->48462 48464->48462 48466 78188e6 48465->48466 48466->48365 48467 781914b 48466->48467 48468 7816290 Wow64SetThreadContext 48466->48468 48469 7816298 Wow64SetThreadContext 48466->48469 48468->48466 48469->48466 48473 7816290 Wow64SetThreadContext 48470->48473 48474 7816298 Wow64SetThreadContext 48470->48474 48471 781914b 48472 78188e6 48472->48365 48472->48470 48472->48471 48473->48472 48474->48472 48476 7819185 48475->48476 48478 78165f0 ReadProcessMemory 48476->48478 48479 7816520 ReadProcessMemory 48476->48479 48480 7816518 ReadProcessMemory 48476->48480 48477 78191a7 48478->48477 48479->48477 48480->48477 48482 7818789 48481->48482 48484 78187f5 48482->48484 48485 7816af0 CreateProcessA 48482->48485 48486 7816ae4 CreateProcessA 48482->48486 48483 78187a0 48483->48365 48484->48365 48485->48483 48486->48483 48488 781899d 48487->48488 48490 78187c8 48487->48490 48491 7816430 WriteProcessMemory 48488->48491 48492 7816428 WriteProcessMemory 48488->48492 48489 78189be 48489->48365 48491->48489 48492->48489 48494 781898c 48493->48494 48496 7816430 WriteProcessMemory 48494->48496 48497 7816428 WriteProcessMemory 48494->48497 48495 78189be 48495->48365 48496->48495 48497->48495 48499 78161e4 ResumeThread 48498->48499 48501 7816259 48499->48501 48501->48420 48503 78161eb ResumeThread 48502->48503 48505 7816259 48503->48505 48505->48420 48507 78165f4 48506->48507 48510 78165fa 48506->48510 48508 781658b ReadProcessMemory 48507->48508 48507->48510 48509 78165af 48508->48509 48509->48425 48510->48425 48512 781651c ReadProcessMemory 48511->48512 48514 78165af 48512->48514 48514->48425 48516 7816523 ReadProcessMemory 48515->48516 48518 78165af 48516->48518 48518->48425 48520 7816373 VirtualAllocEx 48519->48520 48522 78163ed 48520->48522 48522->48431 48524 781636c VirtualAllocEx 48523->48524 48526 78163ed 48524->48526 48526->48431 48528 7816433 WriteProcessMemory 48527->48528 48530 78164cf 48528->48530 48530->48435 48532 781642c WriteProcessMemory 48531->48532 48534 78164cf 48532->48534 48534->48435 48537 7816ae8 48535->48537 48536 7816a7d 48536->48446 48537->48536 48538 7816cde CreateProcessA 48537->48538 48539 7816d3b 48538->48539 48541 7816af3 CreateProcessA 48540->48541 48543 7816d3b 48541->48543 48545 78193fb 48544->48545 48547 7816290 Wow64SetThreadContext 48545->48547 48548 7816298 Wow64SetThreadContext 48545->48548 48546 7819423 48546->48456 48547->48546 48548->48546 48550 78193ec 48549->48550 48552 7816290 Wow64SetThreadContext 48550->48552 48553 7816298 Wow64SetThreadContext 48550->48553 48551 7819423 48551->48456 48552->48551 48553->48551 48565 57d4291 48566 57d43ac 48565->48566 48567 57d4302 48565->48567 48571 57d113c 48566->48571 48569 57d435a CallWindowProcW 48567->48569 48570 57d4309 48567->48570 48569->48570 48572 57d1147 48571->48572 48574 57d2c69 48572->48574 48575 57d1264 CallWindowProcW 48572->48575 48575->48574 48554 57d1cf0 48555 57d1cf5 CreateWindowExW 48554->48555 48557 57d1e14 48555->48557 48576 172d01c 48577 172d034 48576->48577 48578 172d08e 48577->48578 48579 57d113c CallWindowProcW 48577->48579 48583 57d2c08 48577->48583 48587 57d1e98 48577->48587 48591 57d1ea8 48577->48591 48579->48578 48585 57d2c45 48583->48585 48586 57d2c69 48585->48586 48595 57d1264 CallWindowProcW 48585->48595 48588 57d1e9e 48587->48588 48589 57d113c CallWindowProcW 48588->48589 48590 57d1eef 48589->48590 48590->48578 48592 57d1ead 48591->48592 48593 57d113c CallWindowProcW 48592->48593 48594 57d1eef 48593->48594 48594->48578 48595->48586 48623 196d6a8 48624 196d6ad DuplicateHandle 48623->48624 48625 196d73e 48624->48625 48626 1964668 48627 196467a 48626->48627 48628 1964686 48627->48628 48630 1964778 48627->48630 48631 196479d 48630->48631 48635 1964888 48631->48635 48639 1964878 48631->48639 48637 19648af 48635->48637 48636 196498c 48637->48636 48643 19644b0 48637->48643 48640 19648af 48639->48640 48641 196498c 48640->48641 48642 19644b0 CreateActCtxA 48640->48642 48642->48641 48644 1965918 CreateActCtxA 48643->48644 48646 19659db 48644->48646

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 0196D4DE
                                                          • GetCurrentThread.KERNEL32 ref: 0196D51B
                                                          • GetCurrentProcess.KERNEL32 ref: 0196D558
                                                          • GetCurrentThreadId.KERNEL32 ref: 0196D5B1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: bb15ca53875fb205d5f7c1e4d44f3d2de970bd8c90ea9b8a4059f4a3205ba8a2
                                                          • Instruction ID: d37c7620071fa7d699a61345a3a2dc921ae55b734bd0a11fc32feb65ddd89059
                                                          • Opcode Fuzzy Hash: bb15ca53875fb205d5f7c1e4d44f3d2de970bd8c90ea9b8a4059f4a3205ba8a2
                                                          • Instruction Fuzzy Hash: B65178B0900709CFEB18DFA9D588BAEBBF5EF48314F248059D019AB360D7359944CF62

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 0196D4DE
                                                          • GetCurrentThread.KERNEL32 ref: 0196D51B
                                                          • GetCurrentProcess.KERNEL32 ref: 0196D558
                                                          • GetCurrentThreadId.KERNEL32 ref: 0196D5B1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 2bc46f8e40294c21115910f6aecf45b48c0d772c7533a82554c122cc248dc01d
                                                          • Instruction ID: d0745fe1f49b6f4a3a3fcc07faae9530128de073da063aaf0800f0ab3aa5d609
                                                          • Opcode Fuzzy Hash: 2bc46f8e40294c21115910f6aecf45b48c0d772c7533a82554c122cc248dc01d
                                                          • Instruction Fuzzy Hash: 075178B0900709CFEB18DFAAD548B9EBBF5EF88314F208059D019AB360D7359944CB62

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1602 7816ae4-7816ae6 1603 7816ae8 1602->1603 1604 7816aef-7816af1 1602->1604 1605 7816aea 1603->1605 1606 7816a7d-7816aaa 1603->1606 1608 7816af3-7816af6 1604->1608 1605->1608 1609 7816aec-7816aee 1605->1609 1614 7816ab3-7816ad8 1606->1614 1615 7816aac-7816ab2 1606->1615 1610 7816af7-7816b85 1608->1610 1609->1604 1609->1610 1616 7816b87-7816b91 1610->1616 1617 7816bbe-7816bde 1610->1617 1615->1614 1616->1617 1618 7816b93-7816b95 1616->1618 1624 7816be0-7816bea 1617->1624 1625 7816c17-7816c46 1617->1625 1621 7816b97-7816ba1 1618->1621 1622 7816bb8-7816bbb 1618->1622 1626 7816ba3 1621->1626 1627 7816ba5-7816bb4 1621->1627 1622->1617 1624->1625 1628 7816bec-7816bee 1624->1628 1636 7816c48-7816c52 1625->1636 1637 7816c7f-7816d39 CreateProcessA 1625->1637 1626->1627 1627->1627 1629 7816bb6 1627->1629 1631 7816c11-7816c14 1628->1631 1632 7816bf0-7816bfa 1628->1632 1629->1622 1631->1625 1634 7816bfc 1632->1634 1635 7816bfe-7816c0d 1632->1635 1634->1635 1635->1635 1638 7816c0f 1635->1638 1636->1637 1639 7816c54-7816c56 1636->1639 1648 7816d42-7816dc8 1637->1648 1649 7816d3b-7816d41 1637->1649 1638->1631 1641 7816c79-7816c7c 1639->1641 1642 7816c58-7816c62 1639->1642 1641->1637 1643 7816c64 1642->1643 1644 7816c66-7816c75 1642->1644 1643->1644 1644->1644 1645 7816c77 1644->1645 1645->1641 1659 7816dd8-7816ddc 1648->1659 1660 7816dca-7816dce 1648->1660 1649->1648 1662 7816dec-7816df0 1659->1662 1663 7816dde-7816de2 1659->1663 1660->1659 1661 7816dd0 1660->1661 1661->1659 1665 7816e00-7816e04 1662->1665 1666 7816df2-7816df6 1662->1666 1663->1662 1664 7816de4 1663->1664 1664->1662 1668 7816e16-7816e1d 1665->1668 1669 7816e06-7816e0c 1665->1669 1666->1665 1667 7816df8 1666->1667 1667->1665 1670 7816e34 1668->1670 1671 7816e1f-7816e2e 1668->1671 1669->1668 1673 7816e35 1670->1673 1671->1670 1673->1673
                                                          APIs
                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07816D26
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CreateProcess
                                                          • String ID:
                                                          • API String ID: 963392458-0
                                                          • Opcode ID: b26586906cd390242240a290fdb8dd0333541b623824e796aa05fddc6939df96
                                                          • Instruction ID: 6a897d074c5721c32b48f0a1e76a94f124b7d972de92550c59f1eba55184f283
                                                          • Opcode Fuzzy Hash: b26586906cd390242240a290fdb8dd0333541b623824e796aa05fddc6939df96
                                                          • Instruction Fuzzy Hash: 38B17BB1E0021ACFEB20CF69C8407EEBBB5FB54310F1485A9D898E7240EB759995CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1674 7816af0-7816b85 1678 7816b87-7816b91 1674->1678 1679 7816bbe-7816bde 1674->1679 1678->1679 1680 7816b93-7816b95 1678->1680 1684 7816be0-7816bea 1679->1684 1685 7816c17-7816c46 1679->1685 1682 7816b97-7816ba1 1680->1682 1683 7816bb8-7816bbb 1680->1683 1686 7816ba3 1682->1686 1687 7816ba5-7816bb4 1682->1687 1683->1679 1684->1685 1688 7816bec-7816bee 1684->1688 1695 7816c48-7816c52 1685->1695 1696 7816c7f-7816d39 CreateProcessA 1685->1696 1686->1687 1687->1687 1689 7816bb6 1687->1689 1690 7816c11-7816c14 1688->1690 1691 7816bf0-7816bfa 1688->1691 1689->1683 1690->1685 1693 7816bfc 1691->1693 1694 7816bfe-7816c0d 1691->1694 1693->1694 1694->1694 1697 7816c0f 1694->1697 1695->1696 1698 7816c54-7816c56 1695->1698 1707 7816d42-7816dc8 1696->1707 1708 7816d3b-7816d41 1696->1708 1697->1690 1700 7816c79-7816c7c 1698->1700 1701 7816c58-7816c62 1698->1701 1700->1696 1702 7816c64 1701->1702 1703 7816c66-7816c75 1701->1703 1702->1703 1703->1703 1704 7816c77 1703->1704 1704->1700 1718 7816dd8-7816ddc 1707->1718 1719 7816dca-7816dce 1707->1719 1708->1707 1721 7816dec-7816df0 1718->1721 1722 7816dde-7816de2 1718->1722 1719->1718 1720 7816dd0 1719->1720 1720->1718 1724 7816e00-7816e04 1721->1724 1725 7816df2-7816df6 1721->1725 1722->1721 1723 7816de4 1722->1723 1723->1721 1727 7816e16-7816e1d 1724->1727 1728 7816e06-7816e0c 1724->1728 1725->1724 1726 7816df8 1725->1726 1726->1724 1729 7816e34 1727->1729 1730 7816e1f-7816e2e 1727->1730 1728->1727 1732 7816e35 1729->1732 1730->1729 1732->1732
                                                          APIs
                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07816D26
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CreateProcess
                                                          • String ID:
                                                          • API String ID: 963392458-0
                                                          • Opcode ID: a937effc58f2c2b64187f01c3ac7720f37aecb1dba5abeea084ad58fa170c186
                                                          • Instruction ID: 63fc1b3982126531ab05765e8fa458c52333b012b3ab5bd0da7227aa044a5594
                                                          • Opcode Fuzzy Hash: a937effc58f2c2b64187f01c3ac7720f37aecb1dba5abeea084ad58fa170c186
                                                          • Instruction Fuzzy Hash: 629159B1E0021ACFEB10CF69C8817EDBBB6BB48310F1481A9D858E7240EB759995CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1733 196b1c8-196b1d7 1734 196b203-196b207 1733->1734 1735 196b1d9-196b1e6 call 1969c38 1733->1735 1737 196b21b-196b25c 1734->1737 1738 196b209-196b213 1734->1738 1741 196b1fc 1735->1741 1742 196b1e8 1735->1742 1744 196b25e-196b266 1737->1744 1745 196b269-196b277 1737->1745 1738->1737 1741->1734 1790 196b1ee call 196b450 1742->1790 1791 196b1ee call 196b460 1742->1791 1744->1745 1746 196b29b-196b29d 1745->1746 1747 196b279-196b27e 1745->1747 1749 196b2a0-196b2a7 1746->1749 1750 196b280-196b287 call 196ae80 1747->1750 1751 196b289 1747->1751 1748 196b1f4-196b1f6 1748->1741 1752 196b338-196b3b6 1748->1752 1754 196b2b4-196b2bb 1749->1754 1755 196b2a9-196b2b1 1749->1755 1756 196b28b-196b299 1750->1756 1751->1756 1783 196b3bd-196b3f8 1752->1783 1784 196b3b8-196b3bc 1752->1784 1759 196b2bd-196b2c5 1754->1759 1760 196b2c8-196b2d1 call 196ae90 1754->1760 1755->1754 1756->1749 1759->1760 1764 196b2d3-196b2db 1760->1764 1765 196b2de-196b2e3 1760->1765 1764->1765 1766 196b2e5-196b2ec 1765->1766 1767 196b301-196b30e 1765->1767 1766->1767 1769 196b2ee-196b2fe call 196aea0 call 196aeb0 1766->1769 1774 196b310-196b32e 1767->1774 1775 196b331-196b337 1767->1775 1769->1767 1774->1775 1785 196b400-196b42b GetModuleHandleW 1783->1785 1786 196b3fa-196b3fd 1783->1786 1784->1783 1787 196b434-196b448 1785->1787 1788 196b42d-196b433 1785->1788 1786->1785 1788->1787 1790->1748 1791->1748
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0196B41E
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 14f9ecd3b2f968545ce6b445099cde3189f1a8c0770797cf6e2837c016c5a0b8
                                                          • Instruction ID: 01ce955487ff9da22b72e60cbfcc66e3c51669020ce473c908896d594e6859ca
                                                          • Opcode Fuzzy Hash: 14f9ecd3b2f968545ce6b445099cde3189f1a8c0770797cf6e2837c016c5a0b8
                                                          • Instruction Fuzzy Hash: B5714570A00B058FE724DF6AD444B9ABBF9FF88204F00892DD44AD7B50EB75E945CBA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1792 78165f0-78165f2 1793 78165f4-78165f8 1792->1793 1794 78165fb-7816601 1792->1794 1795 781658b-78165ad ReadProcessMemory 1793->1795 1796 78165fa 1793->1796 1798 7816603-781662f 1794->1798 1799 78165b6-78165e6 1795->1799 1800 78165af-78165b5 1795->1800 1796->1794 1796->1798 1801 7816631 1798->1801 1802 7816636-781668f 1798->1802 1800->1799 1801->1802 1804 78167a2-78167b3 1802->1804 1805 7816695-7816697 1802->1805 1807 78167b5-78167b7 1804->1807 1808 781682b-781683c 1804->1808 1805->1804 1809 781669d-78166cd 1805->1809 1807->1808 1813 78167b9-78167c9 1807->1813 1810 7816842-7816844 1808->1810 1811 7816a1b-7816a25 1808->1811 1814 78166d4-78166e5 1809->1814 1815 78166cf 1809->1815 1810->1811 1816 781684a-781687a 1810->1816 1817 78167cb-78167d8 1813->1817 1818 78167da 1813->1818 1819 78166e7 1814->1819 1820 78166ec-7816702 1814->1820 1815->1814 1821 7816881-7816892 1816->1821 1822 781687c 1816->1822 1823 78167dd-7816818 1817->1823 1818->1823 1819->1820 1824 7816704 1820->1824 1825 7816709-781671f 1820->1825 1828 7816894 1821->1828 1829 7816899-78168af 1821->1829 1822->1821 1843 781681a 1823->1843 1844 781681f-7816826 1823->1844 1824->1825 1826 7816721 1825->1826 1827 7816726-7816781 1825->1827 1826->1827 1852 7816783-7816789 1827->1852 1853 781678b 1827->1853 1828->1829 1831 78168b1 1829->1831 1832 78168b6-78168cc 1829->1832 1831->1832 1835 78168d3-7816910 1832->1835 1836 78168ce 1832->1836 1838 7816912 1835->1838 1839 7816917-7816928 1835->1839 1836->1835 1838->1839 1840 781692a 1839->1840 1841 781692f-7816945 1839->1841 1840->1841 1845 7816947 1841->1845 1846 781694c-7816962 1841->1846 1843->1844 1844->1811 1845->1846 1847 7816964 1846->1847 1848 7816969-7816988 1846->1848 1847->1848 1850 7816992 1848->1850 1851 781698a-7816990 1848->1851 1854 7816995-7816a03 1850->1854 1851->1854 1855 781678e-781679d 1852->1855 1853->1855 1862 7816a05-7816a0b 1854->1862 1863 7816a0d 1854->1863 1855->1811 1864 7816a10-7816a18 1862->1864 1863->1864 1864->1811
                                                          APIs
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078165A0
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessRead
                                                          • String ID:
                                                          • API String ID: 1726664587-0
                                                          • Opcode ID: 9d82fe628ed226740a394dccc5bf449d4518b7783e4c814d1621756a90597bb5
                                                          • Instruction ID: f93e74b4b5efb5f684ef5b5fe52c1970d14b43cae373aa8378e768556ae8f2a6
                                                          • Opcode Fuzzy Hash: 9d82fe628ed226740a394dccc5bf449d4518b7783e4c814d1621756a90597bb5
                                                          • Instruction Fuzzy Hash: 26614BB1E0021A8FDB24CFA9C5406AEFBB6FF89300F24C16AD458A7255DB359941CFA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1866 57d1ce4-57d1cee 1867 57d1cf5-57d1d56 1866->1867 1868 57d1cf0-57d1cf4 1866->1868 1869 57d1d58-57d1d5e 1867->1869 1870 57d1d61-57d1d68 1867->1870 1868->1867 1869->1870 1871 57d1d6a-57d1d70 1870->1871 1872 57d1d73-57d1dab 1870->1872 1871->1872 1873 57d1db3-57d1e12 CreateWindowExW 1872->1873 1874 57d1e1b-57d1e53 1873->1874 1875 57d1e14-57d1e1a 1873->1875 1879 57d1e55-57d1e58 1874->1879 1880 57d1e60 1874->1880 1875->1874 1879->1880 1881 57d1e61 1880->1881 1881->1881
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 057D1E02
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1517602236.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_57d0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: e73ccdee8990c61e98676f164f5fccfd8bd9b6d65b131a59edb0817fde638b8a
                                                          • Instruction ID: 039521b6ad49d5dbe11db3a51fac723be25c63f55638b6799dbc3e2f94ecc4fa
                                                          • Opcode Fuzzy Hash: e73ccdee8990c61e98676f164f5fccfd8bd9b6d65b131a59edb0817fde638b8a
                                                          • Instruction Fuzzy Hash: 9551B0B1D00309DFDB14CFAAC984ADEFBB5BF48310F64812AE819AB210D7759845CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1882 57d1cf0-57d1d56 1884 57d1d58-57d1d5e 1882->1884 1885 57d1d61-57d1d68 1882->1885 1884->1885 1886 57d1d6a-57d1d70 1885->1886 1887 57d1d73-57d1e12 CreateWindowExW 1885->1887 1886->1887 1889 57d1e1b-57d1e53 1887->1889 1890 57d1e14-57d1e1a 1887->1890 1894 57d1e55-57d1e58 1889->1894 1895 57d1e60 1889->1895 1890->1889 1894->1895 1896 57d1e61 1895->1896 1896->1896
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 057D1E02
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1517602236.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_57d0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: a3c614e70dd239190970f4ed8d01bff0179ba7ba39c5102fd479354fcb6e1c7d
                                                          • Instruction ID: 41ddea39633a9a9b1e37c879ecb108214ff5d0bbde52fc05878bb4784d58d9cd
                                                          • Opcode Fuzzy Hash: a3c614e70dd239190970f4ed8d01bff0179ba7ba39c5102fd479354fcb6e1c7d
                                                          • Instruction Fuzzy Hash: 4641B0B1D00349DFDB14CFAAC984ADEFBB5BF88310F64812AE819AB210D7759845CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1897 57d1264-57d42fc 1900 57d43ac-57d43cc call 57d113c 1897->1900 1901 57d4302-57d4307 1897->1901 1908 57d43cf-57d43dc 1900->1908 1903 57d4309-57d4340 1901->1903 1904 57d435a-57d4392 CallWindowProcW 1901->1904 1911 57d4349-57d4358 1903->1911 1912 57d4342-57d4348 1903->1912 1905 57d439b-57d43aa 1904->1905 1906 57d4394-57d439a 1904->1906 1905->1908 1906->1905 1911->1908 1912->1911
                                                          APIs
                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 057D4381
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1517602236.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_57d0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CallProcWindow
                                                          • String ID:
                                                          • API String ID: 2714655100-0
                                                          • Opcode ID: 65ccfe90193830818c438bf720f2826c567aaad6c7f2fa1c3692449bf43004d5
                                                          • Instruction ID: 23ade3062a6d68eaeade674094e939b5bdf1f9c3731963af16b63a9f841a3e16
                                                          • Opcode Fuzzy Hash: 65ccfe90193830818c438bf720f2826c567aaad6c7f2fa1c3692449bf43004d5
                                                          • Instruction Fuzzy Hash: 98412AB4900709DFDB14CF99C488AAAFBF6FB88314F148459D519AB321C374A841CFA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1914 19644b0-19659d9 CreateActCtxA 1917 19659e2-1965a3c 1914->1917 1918 19659db-19659e1 1914->1918 1925 1965a3e-1965a41 1917->1925 1926 1965a4b-1965a4f 1917->1926 1918->1917 1925->1926 1927 1965a60 1926->1927 1928 1965a51-1965a5d 1926->1928 1930 1965a61 1927->1930 1928->1927 1930->1930
                                                          APIs
                                                          • CreateActCtxA.KERNEL32(?), ref: 019659C9
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: 2d5bf2252f629dcd4dfda2a1d0ae0fa92ac8a2fa8bea99059bdc4498b59bfefe
                                                          • Instruction ID: 087e23c06e38079b7cc3535374cb3f83c92800d474542bd68938ec96314611fc
                                                          • Opcode Fuzzy Hash: 2d5bf2252f629dcd4dfda2a1d0ae0fa92ac8a2fa8bea99059bdc4498b59bfefe
                                                          • Instruction Fuzzy Hash: F041D271C0071DCFEB24CFAAC985B9EBBB5BF89704F60806AD408AB251DB715945CFA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1931 196590c-19659d9 CreateActCtxA 1933 19659e2-1965a3c 1931->1933 1934 19659db-19659e1 1931->1934 1941 1965a3e-1965a41 1933->1941 1942 1965a4b-1965a4f 1933->1942 1934->1933 1941->1942 1943 1965a60 1942->1943 1944 1965a51-1965a5d 1942->1944 1946 1965a61 1943->1946 1944->1943 1946->1946
                                                          APIs
                                                          • CreateActCtxA.KERNEL32(?), ref: 019659C9
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: c88a3a191be38c1ee8fd240e79232dd648516b013d8aa28a5852109765022fe5
                                                          • Instruction ID: 028d88d8dae154dc530e29c5c15c9e26da38bb8a9242e9587c0736230ead54ba
                                                          • Opcode Fuzzy Hash: c88a3a191be38c1ee8fd240e79232dd648516b013d8aa28a5852109765022fe5
                                                          • Instruction Fuzzy Hash: 2B41F3B1C00719CFEB24CFA9C985BDEBBB5BF89704F24806AD408AB251DB755946CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1947 7c62e41-7c62e75 call 7c608ec 1950 7c62e77-7c62e87 1947->1950 1951 7c62e8a-7c62f1c CreateIconFromResourceEx 1947->1951 1955 7c62f25-7c62f42 1951->1955 1956 7c62f1e-7c62f24 1951->1956 1956->1955
                                                          APIs
                                                          • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 07C62F0F
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1519075850.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7c60000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CreateFromIconResource
                                                          • String ID:
                                                          • API String ID: 3668623891-0
                                                          • Opcode ID: 7c75dd83aec9bde982657afb385dd988c18864150eb0f6a6af42af4c40029cb2
                                                          • Instruction ID: 36a18d74c82016df31c0a8dbc5e2b146a1bdd5dc7223ea5da3a3392424cdf626
                                                          • Opcode Fuzzy Hash: 7c75dd83aec9bde982657afb385dd988c18864150eb0f6a6af42af4c40029cb2
                                                          • Instruction Fuzzy Hash: FB318C72804359DFCB118FAAC884B9ABFF9EF09310F04805AE954A7261C3359954DBA1
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 078164C0
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 16ae9bf89d17bb3a3b64a2b90dfc808e3e2d0d5d13b9b4df8fe60ecbffcf274a
                                                          • Instruction ID: 81632bacd9b58e6e65dce515eca1796416a1a970b091d701595e7ec407ef4622
                                                          • Opcode Fuzzy Hash: 16ae9bf89d17bb3a3b64a2b90dfc808e3e2d0d5d13b9b4df8fe60ecbffcf274a
                                                          • Instruction Fuzzy Hash: F82148B5900359DFDB10CFAAC8407DEBBF5FF48310F14882AE958A7241D7789545CBA5
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 078164C0
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 325937a035a631ad8a7f419a88f50af8a28a0e8e410db9d7b0f8406feb4c6928
                                                          • Instruction ID: 135a89ec27e44848830f8ea2262164ab6bc15fe0460c13d49079027ba35f86cb
                                                          • Opcode Fuzzy Hash: 325937a035a631ad8a7f419a88f50af8a28a0e8e410db9d7b0f8406feb4c6928
                                                          • Instruction Fuzzy Hash: A82125B1900359DFDB10CFAAC881BDEBBF5FF48310F14882AE958A7240D7799944CBA4
                                                          APIs
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078165A0
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessRead
                                                          • String ID:
                                                          • API String ID: 1726664587-0
                                                          • Opcode ID: 8bf09b342725d10d62e135c5666f3262e64baeb3bd54ba97fd436e4c037fa16b
                                                          • Instruction ID: 350e653ab0854f8d18edf2113dd5a55952b38129bd4e1f9ee8e7780d40b4e5fb
                                                          • Opcode Fuzzy Hash: 8bf09b342725d10d62e135c5666f3262e64baeb3bd54ba97fd436e4c037fa16b
                                                          • Instruction Fuzzy Hash: 032139B1D00259DFDB10CFAAD840BEEBBF5FF48310F14842AE558A7240D7799541CB61
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07816316
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: f70255d22b14d2abdc5bd4860f32bca33b6f11348a8927093a635b5aaab846cb
                                                          • Instruction ID: 59b1dac9d3a39989548554e932514b224363536c6462823709b93280776e0f8c
                                                          • Opcode Fuzzy Hash: f70255d22b14d2abdc5bd4860f32bca33b6f11348a8927093a635b5aaab846cb
                                                          • Instruction Fuzzy Hash: E32125B1D003099FDB14CFAAC4857EEBBF4FF88310F14842AD459A7241DB789945CBA5
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0196D72F
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 994da07d1f312687782b6b0191432162893441e42318a01cb4a55457f4dd4887
                                                          • Instruction ID: 3d064cb1f9f076daecc03dcb9d71dcc5d32075ca22a78faf8aadb7329ede6a09
                                                          • Opcode Fuzzy Hash: 994da07d1f312687782b6b0191432162893441e42318a01cb4a55457f4dd4887
                                                          • Instruction Fuzzy Hash: 9A21E3B5900348AFDB10CFAAD984ADEBBF8EB48310F14841AE958A7310D378A940CF65
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07816316
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 5570039c03e88f49c6336c612e9c5f4a47aac46a974c7632c1f4d420e8ed1f6b
                                                          • Instruction ID: dc33f88954ee72491305b39d8ccb1f03fcbdae775f54561b6b10e065624542a8
                                                          • Opcode Fuzzy Hash: 5570039c03e88f49c6336c612e9c5f4a47aac46a974c7632c1f4d420e8ed1f6b
                                                          • Instruction Fuzzy Hash: 732135B1D003099FDB10DFAAC4857AEBBF4EF88210F14842AD459A7241DB789945CFA5
                                                          APIs
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078165A0
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessRead
                                                          • String ID:
                                                          • API String ID: 1726664587-0
                                                          • Opcode ID: 8c73c1c43598ab4717f4207d214b2adeb8d8a85e49b3352b374b540bf7338bdd
                                                          • Instruction ID: 7a55770efc08de821c76e4f4a726d8e6420c259617fbc623556836e5e7c94285
                                                          • Opcode Fuzzy Hash: 8c73c1c43598ab4717f4207d214b2adeb8d8a85e49b3352b374b540bf7338bdd
                                                          • Instruction Fuzzy Hash: F52128B1D003599FDB10CFAAC941BDEBBF5FF48310F14842AE959A7240D7799500DBA5
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0196D72F
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 79a4629ff7ebed44752a61f192a2438aa15119bec5346346fecb66b658a6e2df
                                                          • Instruction ID: 7a968c1dff63d9c783848d89684a78bc0b21924b593a32d603572deb22de3aaa
                                                          • Opcode Fuzzy Hash: 79a4629ff7ebed44752a61f192a2438aa15119bec5346346fecb66b658a6e2df
                                                          • Instruction Fuzzy Hash: 7B21C4B5900248DFDB10CFAAD984ADEFBF8FB48310F14841AE958A7350D379A944CF65
                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 078163DE
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: b8ab14b3fe1fca248f108c073fdd7f70e8157b7903102d071016cd792670ebc1
                                                          • Instruction ID: 3376bca723eeeb9d41670c884e42a73491a585f706b97d4329a3528c85ef3a32
                                                          • Opcode Fuzzy Hash: b8ab14b3fe1fca248f108c073fdd7f70e8157b7903102d071016cd792670ebc1
                                                          • Instruction Fuzzy Hash: 74115971900249DFDB20CFAAC844BEFBBF5EF88310F14881AE555A7250CB359541DBA1
                                                          APIs
                                                          • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 07C62F0F
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1519075850.0000000007C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7c60000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: CreateFromIconResource
                                                          • String ID:
                                                          • API String ID: 3668623891-0
                                                          • Opcode ID: e2878c460db41c99ae4122ea7b733d58cfbd0f2974f5f462cffac7dd1b522f1b
                                                          • Instruction ID: 4c9fccd8d4bb446dcc62fa93bf77401cd063cc3d402572fa12d9f8fb15c9c112
                                                          • Opcode Fuzzy Hash: e2878c460db41c99ae4122ea7b733d58cfbd0f2974f5f462cffac7dd1b522f1b
                                                          • Instruction Fuzzy Hash: DC1104B5800259DFDB10CFAAD884BDEBFF8EB48320F14841AE914A7250C379A954DFA5
                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 078163DE
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 35362852fa49b0e110cedf0639bc6f1535ecfcb14ce6cccafa537700f472821b
                                                          • Instruction ID: 6ad452296905bac4f5f317f1154c3dae636e2f7377eefff4e209e5e7520624e5
                                                          • Opcode Fuzzy Hash: 35362852fa49b0e110cedf0639bc6f1535ecfcb14ce6cccafa537700f472821b
                                                          • Instruction Fuzzy Hash: 921126719002499FDB10DFAAC844BDEBBF5EB88310F148819E519A7250CB769540CBA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: ca9193eb0c6388ade4c84fe6072c17a231cd4f8573bee7687135f1e8643eff60
                                                          • Instruction ID: d0c932758e42c0b84e6f16f0cc418cec3924a09d5f8a8a56627d9d3a89dd12dd
                                                          • Opcode Fuzzy Hash: ca9193eb0c6388ade4c84fe6072c17a231cd4f8573bee7687135f1e8643eff60
                                                          • Instruction Fuzzy Hash: 86115BB1D00249CFDB20CFAAD8447EEFBF4AB88310F24845AC459A7240CB759541CBA5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: e0566eeac69c8e74d3d3a0ca5ae7fd6142b450f9a0075372a6552fae08498816
                                                          • Instruction ID: 40cb080b69466ec824e8d7099a27c2c89ca9e199a944d5ede587a2bb80957b8e
                                                          • Opcode Fuzzy Hash: e0566eeac69c8e74d3d3a0ca5ae7fd6142b450f9a0075372a6552fae08498816
                                                          • Instruction Fuzzy Hash: 76113AB1D003498FDB20DFAAD44579EFBF8EF88310F248819D519A7240CB796544CBA5
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0196B41E
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1513405263.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1960000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 1124d16bb29f218e84f6c5d7c2862fe16697c6aca744e1bacab201a73b90fd94
                                                          • Instruction ID: d111616dddd639ff275797be2136c8bafd2bcd778e737ac7bbd5d41692b8d999
                                                          • Opcode Fuzzy Hash: 1124d16bb29f218e84f6c5d7c2862fe16697c6aca744e1bacab201a73b90fd94
                                                          • Instruction Fuzzy Hash: 48110FB5D006498FDB20CF9AD444ADEFBF8AB88614F14841AD829A7310D375A545CFA1
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 07819745
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: cd2900d764a8dc18f4a5d5dc7a17c645117f69f2e83b206374546a5568566348
                                                          • Instruction ID: 8736af07596bad7149c0cbfe07a1a2da3311b80a4ee27ea46ae40d16f9883b09
                                                          • Opcode Fuzzy Hash: cd2900d764a8dc18f4a5d5dc7a17c645117f69f2e83b206374546a5568566348
                                                          • Instruction Fuzzy Hash: 0911F5B5800749DFDB10CF9AC485BEEBBF8EB48314F108859E518A7201C375A944CFA5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 07819745
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1518909863.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_7810000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 9e874d5b72c35e0b05f6cb9384cb00a8f1d1fc434783262d9dd85e71e9a488ec
                                                          • Instruction ID: a3fc7323229de76ff6df84e6f6cd090b34d3e0ac50b572bfc03fe098bfdc9c70
                                                          • Opcode Fuzzy Hash: 9e874d5b72c35e0b05f6cb9384cb00a8f1d1fc434783262d9dd85e71e9a488ec
                                                          • Instruction Fuzzy Hash: 2C1103B5800349DFDB20CF9AD885BDEFBF8EB48310F10885AE518A7600C375A544CFA1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512528153.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_171d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ba73659a43e070de0bce4cdb40e27713b2c90a70352bc4fe0c8d647b967383a4
                                                          • Instruction ID: 0e8497dcb5a61561ae3c5c51ea6571f36616d2e1a6a90c46bd2f3dbdfac11ee6
                                                          • Opcode Fuzzy Hash: ba73659a43e070de0bce4cdb40e27713b2c90a70352bc4fe0c8d647b967383a4
                                                          • Instruction Fuzzy Hash: B82148B1540204DFDB25DF98D9C4B56FB65FB88314F20C1A8EC090B24AC336E446CFA2
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512718892.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_172d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bbedf937988ac8cde9e79859fa0ecb80370f0cb3905b5e364a93e8ee32be5568
                                                          • Instruction ID: 6e48e78bc08a2f98534c74e71dcb6038148aae63e4443a94e55103ae7ea6770c
                                                          • Opcode Fuzzy Hash: bbedf937988ac8cde9e79859fa0ecb80370f0cb3905b5e364a93e8ee32be5568
                                                          • Instruction Fuzzy Hash: FC212971508344EFDB25DF94D9C0B25FBA5FB85324F24C5ADE8094B252C336D447CA62
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512718892.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_172d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9cfb03d42e7c4ffc66f3cc8c0d4222f3c5b61657fa73f12227dc305bb6b55142
                                                          • Instruction ID: 37837fa1089211f03de1bd87053f1d1478f28b6d8154a0cc874a78c4dc3cb57c
                                                          • Opcode Fuzzy Hash: 9cfb03d42e7c4ffc66f3cc8c0d4222f3c5b61657fa73f12227dc305bb6b55142
                                                          • Instruction Fuzzy Hash: 14210371604244DFDB35DFA4D980B16FB61FB84214F20C5ADD8090B266C33AD407CA62
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512528153.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_171d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                          • Instruction ID: 06beaef832233a6e91092914489e76f238c1eaba2de71963decbec47fcf8d43f
                                                          • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                          • Instruction Fuzzy Hash: CE11CD72404240DFCB16CF48D9C4B56FF62FB84224F24C6A9DC090A65BC33AE456CFA2
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512718892.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_172d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction ID: 0add9548eb8624cab38f0c3551086d689fb33124c7a782f1b96b5f44bf560a26
                                                          • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction Fuzzy Hash: 8B11BB75504280DFCB22CF54D5C4B15FFA2FB88314F24C6AAD8494B666C33AD44BCBA2
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512718892.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_172d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction ID: 712af78a6f4b4226b14a47bdd5cc1ccb85cd6341df74d3e6e3f09961c172ceb4
                                                          • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                          • Instruction Fuzzy Hash: 2C11BB75908280DFDB12CF54C5C0B15FFA1FB85224F24C6A9D8498B696C33AD44ACB62
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512528153.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_171d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 020029c0922b2cd1ccfdf47832e0fc325d0e0f635d67b4d6313b5eae001c7ec2
                                                          • Instruction ID: 794ac82cd62f83aec0f5a2a563b310c7a911d96ddd9f799c9c8a61e9c375e103
                                                          • Opcode Fuzzy Hash: 020029c0922b2cd1ccfdf47832e0fc325d0e0f635d67b4d6313b5eae001c7ec2
                                                          • Instruction Fuzzy Hash: 5B01A771004784AAF7305EADDD88B67FF98EF81764F18C55AED090E28BD2799441CE72
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.1512528153.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_171d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dbc8fc0d1fe164a01c84006c43879f56d16b40381409041b5d27ebc69ecbe187
                                                          • Instruction ID: 3e5b7277331d70b06384210db7a24df8b7955a753ce84b773d8b21f6e4310ee7
                                                          • Opcode Fuzzy Hash: dbc8fc0d1fe164a01c84006c43879f56d16b40381409041b5d27ebc69ecbe187
                                                          • Instruction Fuzzy Hash: 7FF06271404784AEE7209E5AD888B66FFD8EB81734F18C45AED084E297C2799844CFB1

                                                          Execution Graph

                                                          Execution Coverage:12.2%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:26
                                                          Total number of Limit Nodes:5
                                                          execution_graph 24637 10b0848 24638 10b084e 24637->24638 24639 10b091b 24638->24639 24642 10b148a 24638->24642 24648 10b1382 24638->24648 24643 10b1493 24642->24643 24645 10b1396 24642->24645 24643->24638 24644 10b1484 24644->24638 24645->24644 24646 10b148a GlobalMemoryStatusEx 24645->24646 24653 10b7ea8 24645->24653 24646->24645 24650 10b1396 24648->24650 24649 10b1484 24649->24638 24650->24649 24651 10b7ea8 GlobalMemoryStatusEx 24650->24651 24652 10b148a GlobalMemoryStatusEx 24650->24652 24651->24650 24652->24650 24654 10b7eb2 24653->24654 24655 10b7ecc 24654->24655 24658 68fd9e0 24654->24658 24663 68fd9f0 24654->24663 24655->24645 24660 68fda05 24658->24660 24659 68fdc1a 24659->24655 24660->24659 24661 68fdc31 GlobalMemoryStatusEx 24660->24661 24662 68fde88 GlobalMemoryStatusEx 24660->24662 24661->24660 24662->24660 24665 68fda05 24663->24665 24664 68fdc1a 24664->24655 24665->24664 24666 68fde88 GlobalMemoryStatusEx 24665->24666 24667 68fdc31 GlobalMemoryStatusEx 24665->24667 24666->24665 24667->24665
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9eae01b266d9278297f047fb6f426a585c8e3a750658764247c9a63941c5fdbb
                                                          • Instruction ID: 2bf2690de0c6b41dd377818facc2a6aa76fd13241cf0e66cab3c617b39c2743f
                                                          • Opcode Fuzzy Hash: 9eae01b266d9278297f047fb6f426a585c8e3a750658764247c9a63941c5fdbb
                                                          • Instruction Fuzzy Hash: 2C53F631D10B1A8ADB51EF68C9846D9F7B1EF99300F11D79AE4587B121FB70AAC4CB81
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2b6d5d094b25a68346eee17dc8e9d8047dc7ab1d348c249ad36c6466fc7e4127
                                                          • Instruction ID: 916558b94978b924d71c4b8a4546ee427e6524c7c8391ff5be718e1f5b1ad1eb
                                                          • Opcode Fuzzy Hash: 2b6d5d094b25a68346eee17dc8e9d8047dc7ab1d348c249ad36c6466fc7e4127
                                                          • Instruction Fuzzy Hash: 9C231E31D1071A8ADB11EF68C8845EDF7B1FF99300F15C79AE459A7221EB70AAC5CB81
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 811fa1c3aed66d3ac61beb2c5d9633df5e574964860314284de7a4a289a94bd1
                                                          • Instruction ID: 8162273dfb993cd7cbcbd3b0a158f4aa43d33eeadbb2f2fcf8c87cd6759b7b33
                                                          • Opcode Fuzzy Hash: 811fa1c3aed66d3ac61beb2c5d9633df5e574964860314284de7a4a289a94bd1
                                                          • Instruction Fuzzy Hash: D7B18C70E00209CFDB50DFA8C8C1BEDBBF2AF88714F148129D956EB295EB749945CB81
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2cd86cfebe161dcbc5b1f38069043bfc54dd31af177597df7f5992498ce860d1
                                                          • Instruction ID: 2df5753b790fffd0158120ef7ea508f366ab64588ae35c6ced11ad2a1de7a4ec
                                                          • Opcode Fuzzy Hash: 2cd86cfebe161dcbc5b1f38069043bfc54dd31af177597df7f5992498ce860d1
                                                          • Instruction Fuzzy Hash: C2915B70E0020ADFDB50CFA9C8857EEBBF2BF88314F248529E445EB255EB749945CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 887 68fe950-68fe96b 888 68fe96d-68fe994 call 68fd1d0 887->888 889 68fe995-68fe9b4 call 68fe550 887->889 895 68fe9ba-68fea19 889->895 896 68fe9b6-68fe9b9 889->896 903 68fea1f-68feaac GlobalMemoryStatusEx 895->903 904 68fea1b-68fea1e 895->904 908 68feaae-68feab4 903->908 909 68feab5-68feadd 903->909 908->909
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2708964161.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_68f0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d92efbc7d7dd464191e7f3f5ab6c752cc749f5676e24ced5681a35856cf3e319
                                                          • Instruction ID: 9aead60f8a999d041332110b1ec0c77ba118a5c704697c477424ffc68db874a1
                                                          • Opcode Fuzzy Hash: d92efbc7d7dd464191e7f3f5ab6c752cc749f5676e24ced5681a35856cf3e319
                                                          • Instruction Fuzzy Hash: 61412472D007499FCB14DFA9D8042AEBBF5AF89210F14856ADA44EB340EB749844CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 912 68fea38-68fea76 913 68fea7e-68feaac GlobalMemoryStatusEx 912->913 914 68feaae-68feab4 913->914 915 68feab5-68feadd 913->915 914->915
                                                          APIs
                                                          • GlobalMemoryStatusEx.KERNEL32 ref: 068FEA9F
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2708964161.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_68f0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemoryStatus
                                                          • String ID:
                                                          • API String ID: 1890195054-0
                                                          • Opcode ID: 3d5bcbcab81c21bf397f77e3774234cfb1be8764eeb59e93a9f68dd5b9ebddfb
                                                          • Instruction ID: cd144d582ae70c97d22b43429c7f44770601d595b2793f1e299b1fa3cbd46bb5
                                                          • Opcode Fuzzy Hash: 3d5bcbcab81c21bf397f77e3774234cfb1be8764eeb59e93a9f68dd5b9ebddfb
                                                          • Instruction Fuzzy Hash: F31112B1C006599BDB10CFAAC444B9EFBF4BB48220F14812AD918B7240D378A944CFA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2661 10b8720-10b8737 2662 10b8739-10b873c 2661->2662 2663 10b8769-10b876c 2662->2663 2664 10b873e-10b8764 2662->2664 2665 10b8799-10b879c 2663->2665 2666 10b876e-10b8794 2663->2666 2664->2663 2668 10b87c9-10b87cc 2665->2668 2669 10b879e-10b87c4 2665->2669 2666->2665 2670 10b87f9-10b87fc 2668->2670 2671 10b87ce-10b87f4 2668->2671 2669->2668 2675 10b8829-10b882c 2670->2675 2676 10b87fe-10b8824 2670->2676 2671->2670 2677 10b8859-10b885c 2675->2677 2678 10b882e-10b8854 2675->2678 2676->2675 2684 10b8889-10b888c 2677->2684 2685 10b885e-10b8884 2677->2685 2678->2677 2686 10b88b9-10b88bc 2684->2686 2687 10b888e-10b88b4 2684->2687 2685->2684 2694 10b88be-10b88c0 2686->2694 2695 10b88cd-10b88d0 2686->2695 2687->2686 2875 10b88c2 call 10ba01b 2694->2875 2876 10b88c2 call 10b9f68 2694->2876 2877 10b88c2 call 10b9f78 2694->2877 2696 10b88fd-10b8900 2695->2696 2697 10b88d2-10b88f8 2695->2697 2704 10b892d-10b8930 2696->2704 2705 10b8902-10b8928 2696->2705 2697->2696 2701 10b88c8 2701->2695 2706 10b895d-10b8960 2704->2706 2707 10b8932-10b8958 2704->2707 2705->2704 2712 10b898d-10b8990 2706->2712 2713 10b8962-10b8988 2706->2713 2707->2706 2715 10b89bd-10b89c0 2712->2715 2716 10b8992-10b89b8 2712->2716 2713->2712 2720 10b89ed-10b89f0 2715->2720 2721 10b89c2-10b89e8 2715->2721 2716->2715 2724 10b8a1d-10b8a20 2720->2724 2725 10b89f2-10b8a18 2720->2725 2721->2720 2730 10b8a4d-10b8a50 2724->2730 2731 10b8a22-10b8a48 2724->2731 2725->2724 2734 10b8a7d-10b8a80 2730->2734 2735 10b8a52-10b8a78 2730->2735 2731->2730 2740 10b8aad-10b8ab0 2734->2740 2741 10b8a82-10b8aa8 2734->2741 2735->2734 2744 10b8add-10b8ae0 2740->2744 2745 10b8ab2-10b8ad8 2740->2745 2741->2740 2750 10b8b0d-10b8b10 2744->2750 2751 10b8ae2-10b8b08 2744->2751 2745->2744 2754 10b8b3d-10b8b40 2750->2754 2755 10b8b12-10b8b38 2750->2755 2751->2750 2760 10b8b6d-10b8b70 2754->2760 2761 10b8b42-10b8b68 2754->2761 2755->2754 2764 10b8b9d-10b8ba0 2760->2764 2765 10b8b72-10b8b98 2760->2765 2761->2760 2770 10b8bcd-10b8bd0 2764->2770 2771 10b8ba2-10b8bc8 2764->2771 2765->2764 2774 10b8bed-10b8bf0 2770->2774 2775 10b8bd2-10b8be8 2770->2775 2771->2770 2780 10b8c1d-10b8c20 2774->2780 2781 10b8bf2-10b8c18 2774->2781 2775->2774 2784 10b8c4d-10b8c50 2780->2784 2785 10b8c22-10b8c48 2780->2785 2781->2780 2790 10b8c6b-10b8c6e 2784->2790 2791 10b8c52-10b8c5e 2784->2791 2785->2784 2797 10b8c9b-10b8c9e 2790->2797 2798 10b8c70-10b8c96 2790->2798 2811 10b8c66 2791->2811 2800 10b8ccb-10b8cce 2797->2800 2801 10b8ca0-10b8cc6 2797->2801 2798->2797 2806 10b8cfb-10b8cfe 2800->2806 2807 10b8cd0-10b8cf6 2800->2807 2801->2800 2808 10b8d2b-10b8d2e 2806->2808 2809 10b8d00-10b8d26 2806->2809 2807->2806 2816 10b8d5b-10b8d5e 2808->2816 2817 10b8d30-10b8d56 2808->2817 2809->2808 2811->2790 2818 10b8d8b-10b8d8e 2816->2818 2819 10b8d60-10b8d86 2816->2819 2817->2816 2825 10b8dbb-10b8dbe 2818->2825 2826 10b8d90-10b8db6 2818->2826 2819->2818 2827 10b8deb-10b8dee 2825->2827 2828 10b8dc0-10b8de6 2825->2828 2826->2825 2835 10b8e1b-10b8e1e 2827->2835 2836 10b8df0-10b8e16 2827->2836 2828->2827 2837 10b8e2b-10b8e2e 2835->2837 2838 10b8e20 2835->2838 2836->2835 2845 10b8e5b-10b8e5e 2837->2845 2846 10b8e30-10b8e56 2837->2846 2849 10b8e26 2838->2849 2847 10b8e8b-10b8e8e 2845->2847 2848 10b8e60-10b8e86 2845->2848 2846->2845 2854 10b8ebb-10b8ebe 2847->2854 2855 10b8e90-10b8eb6 2847->2855 2848->2847 2849->2837 2857 10b8eeb-10b8eed 2854->2857 2858 10b8ec0-10b8ee6 2854->2858 2855->2854 2862 10b8eef 2857->2862 2863 10b8ef4-10b8ef7 2857->2863 2858->2857 2862->2863 2863->2662 2868 10b8efd-10b8f03 2863->2868 2875->2701 2876->2701 2877->2701
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 980a619c896379a58b8b2f356ce4597484326443ce0ca2c6099cf92f40600f47
                                                          • Instruction ID: 1c147191d39fc70a72af20ea7d39a6f92447f2bc1e455f467ad98eb6fe478713
                                                          • Opcode Fuzzy Hash: 980a619c896379a58b8b2f356ce4597484326443ce0ca2c6099cf92f40600f47
                                                          • Instruction Fuzzy Hash: E31290307002069BDB6AAB7CF49469C33D6FBCA210B109A39E146CF355DF75ED4A8B91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3317 10ba1aa-10ba1b0 3318 10ba1b1-10ba1b4 3317->3318 3319 10ba1c7-10ba1ca 3318->3319 3320 10ba1b6-10ba1c2 3318->3320 3321 10ba1ff-10ba202 3319->3321 3322 10ba1cc-10ba1fa 3319->3322 3320->3319 3323 10ba208-10ba20b 3321->3323 3324 10ba4c6-10ba4cf 3321->3324 3322->3321 3326 10ba20d-10ba216 3323->3326 3328 10ba228-10ba22b 3323->3328 3324->3326 3327 10ba4d5-10ba4df 3324->3327 3330 10ba21c-10ba223 3326->3330 3331 10ba4e2-10ba512 3326->3331 3332 10ba22d-10ba232 3328->3332 3333 10ba235-10ba238 3328->3333 3330->3328 3342 10ba514-10ba517 3331->3342 3332->3333 3334 10ba25b-10ba25e 3333->3334 3335 10ba23a-10ba256 3333->3335 3338 10ba27a-10ba27c 3334->3338 3339 10ba260-10ba26f 3334->3339 3335->3334 3340 10ba27e 3338->3340 3341 10ba283-10ba286 3338->3341 3348 10ba4c3 3339->3348 3349 10ba275 3339->3349 3340->3341 3341->3318 3344 10ba28c-10ba29a 3341->3344 3345 10ba519-10ba51c 3342->3345 3346 10ba566-10ba56f 3342->3346 3456 10ba29d call 10ba6b8 3344->3456 3457 10ba29d call 10ba6c8 3344->3457 3352 10ba51e-10ba537 3345->3352 3353 10ba53c-10ba53f 3345->3353 3350 10ba5fd-10ba606 3346->3350 3351 10ba575 3346->3351 3348->3324 3349->3338 3357 10ba6ab-10ba6c0 3350->3357 3358 10ba60c-10ba610 3350->3358 3355 10ba57a-10ba57d 3351->3355 3352->3353 3359 10ba561-10ba564 3353->3359 3360 10ba541-10ba55c 3353->3360 3361 10ba598-10ba59b 3355->3361 3362 10ba57f-10ba58d 3355->3362 3364 10ba615-10ba618 3358->3364 3359->3346 3359->3355 3360->3359 3367 10ba5ad-10ba5b0 3361->3367 3368 10ba59d 3361->3368 3373 10ba63c-10ba65e 3362->3373 3384 10ba593 3362->3384 3369 10ba61a-10ba632 3364->3369 3370 10ba637-10ba63a 3364->3370 3366 10ba2a3-10ba2b4 3454 10ba2b7 call 10bdd5f 3366->3454 3455 10ba2b7 call 10bdcc7 3366->3455 3377 10ba5b2-10ba5ca 3367->3377 3378 10ba5d5-10ba5d8 3367->3378 3385 10ba5a5-10ba5a8 3368->3385 3369->3370 3372 10ba65f-10ba662 3370->3372 3370->3373 3382 10ba66c-10ba66f 3372->3382 3383 10ba664-10ba667 3372->3383 3377->3383 3394 10ba5d0 3377->3394 3380 10ba5da-10ba5dd 3378->3380 3381 10ba5e2-10ba5e5 3378->3381 3380->3381 3389 10ba5ef-10ba5f2 3381->3389 3390 10ba5e7-10ba5ec 3381->3390 3391 10ba68e-10ba690 3382->3391 3392 10ba671-10ba689 3382->3392 3383->3382 3384->3361 3385->3367 3395 10ba5f8-10ba5fb 3389->3395 3396 10ba6a0-10ba6aa 3389->3396 3390->3389 3398 10ba692 3391->3398 3399 10ba697-10ba69a 3391->3399 3392->3391 3393 10ba2bd-10ba2bf 3393->3348 3397 10ba2c5-10ba2ca 3393->3397 3394->3378 3395->3350 3395->3364 3403 10ba2d2-10ba2d3 3397->3403 3398->3399 3399->3342 3399->3396 3403->3348 3405 10ba2d9-10ba336 3403->3405 3411 10ba33c-10ba38f 3405->3411 3412 10ba407-10ba421 3405->3412 3430 10ba3af-10ba3d2 call 10b79d4 3411->3430 3431 10ba391-10ba3ad 3411->3431 3417 10ba423-10ba425 3412->3417 3419 10ba433 3417->3419 3420 10ba427-10ba431 3417->3420 3421 10ba438-10ba43a 3419->3421 3420->3421 3423 10ba4ab-10ba4bd 3421->3423 3424 10ba43c-10ba440 3421->3424 3423->3348 3423->3405 3425 10ba442-10ba44f 3424->3425 3426 10ba451 3424->3426 3428 10ba456-10ba458 3425->3428 3426->3428 3428->3423 3432 10ba45a-10ba45c 3428->3432 3444 10ba3d4-10ba405 3430->3444 3431->3444 3432->3423 3433 10ba45e-10ba4a4 3432->3433 3433->3423 3444->3417 3454->3393 3455->3393 3456->3366 3457->3366
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4486a6fa13fc33ca74ea68429eaf22cf4aa24568031fb3e07d40d1b54ab4db04
                                                          • Instruction ID: 1fcbaaea7ecca4e7426f46a0a4931736a4a8b6502fd900e20617b46ca3f5a429
                                                          • Opcode Fuzzy Hash: 4486a6fa13fc33ca74ea68429eaf22cf4aa24568031fb3e07d40d1b54ab4db04
                                                          • Instruction Fuzzy Hash: 03E1BE30B00209CFDB55DB68D894AADBBF2FB89310F24856AE546DB391DB35DD42CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 90db7d182e2e6fccb462fa56834fff69decfa8ac6b65659fd1a071d9f4d0f506
                                                          • Instruction ID: bb296c5c86f47d6d83020bdbffa8bf7b1a5ac2dc13ec349ffb54daa7159b1324
                                                          • Opcode Fuzzy Hash: 90db7d182e2e6fccb462fa56834fff69decfa8ac6b65659fd1a071d9f4d0f506
                                                          • Instruction Fuzzy Hash: F1B17C70E00209CFDB50DFA8C881BEDBBF1BF88714F148129D956EB255EB759945CB81
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dc3ab892cb06724158fcd7fbbb57f76cb857c957407787a78eb2df8a090c9a25
                                                          • Instruction ID: b09290891abd842589056f6bf7343c62828448dbecdb105e6844dcda726302e6
                                                          • Opcode Fuzzy Hash: dc3ab892cb06724158fcd7fbbb57f76cb857c957407787a78eb2df8a090c9a25
                                                          • Instruction Fuzzy Hash: 9EA16A70E0020ADFDB50CFA8C8857EEBBF1BF88314F248529E485EB255EB749945CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d68a014d06305eb3de7f152715b643f4fe0aad03b64d00ca8ab52b5d255ec9f1
                                                          • Instruction ID: cb8e6182ef93665f4983aae6b4a8df7214041b7b78509d4fe782c5719dcc8afd
                                                          • Opcode Fuzzy Hash: d68a014d06305eb3de7f152715b643f4fe0aad03b64d00ca8ab52b5d255ec9f1
                                                          • Instruction Fuzzy Hash: B3518E34710215CFDB54EB68C598AAE77F2FF89700F2040A9E546EB3A1DB769C41CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bd733411bc1cb6930e470843f765ecb33cb20f74e4658bf4cac35bbeabc1a5f1
                                                          • Instruction ID: fd9f7a7f94e639b5b6852dc8ff57f1247ef16bc0c3191ec54fe4b3b123eefd9c
                                                          • Opcode Fuzzy Hash: bd733411bc1cb6930e470843f765ecb33cb20f74e4658bf4cac35bbeabc1a5f1
                                                          • Instruction Fuzzy Hash: 1C513971A00209CFDB54DF69E884B99FBB2FF88310F14C2AAE9099F355E7709945CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0b93585b10d624950e686bc7d25969474a49018a4cc75ba7d857b8981653d438
                                                          • Instruction ID: 598d156de4d13fcf772076c1c359eb2a7441d0f9d9d5d2165abc053833d51803
                                                          • Opcode Fuzzy Hash: 0b93585b10d624950e686bc7d25969474a49018a4cc75ba7d857b8981653d438
                                                          • Instruction Fuzzy Hash: 7B512270D00218CFDB18DFA9C884BEEBBF1BF48300F148169E859AB391D775A844CB95
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6345fd5dfb8fc6d3951b83c9bd5b6bea2430f0f1636c020d0027eaae09da1c29
                                                          • Instruction ID: 487aaf31d6bca29fbf7f3f79864c8e48f70b3bb325f7f304f387f39fe33097dd
                                                          • Opcode Fuzzy Hash: 6345fd5dfb8fc6d3951b83c9bd5b6bea2430f0f1636c020d0027eaae09da1c29
                                                          • Instruction Fuzzy Hash: E4510070D002188FDB18DFA9C884BEEBBF1BF48310F14856AE855AB391D775A844CF95
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c202e905b314a03db4674e2454188c42f60e8d231e26f5509326350010fc6590
                                                          • Instruction ID: 06f8d03a2bb8a405ead3759066e9a66471db3f49ecc52c8efbeb737b498573b7
                                                          • Opcode Fuzzy Hash: c202e905b314a03db4674e2454188c42f60e8d231e26f5509326350010fc6590
                                                          • Instruction Fuzzy Hash: A8511A3125124EDFC70AFF6CF8A09D93BA3BB96204304497AD0448B27EEB756905CB92
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a10e4dd5c44cc3c821ecd9a6aaee0ce7ea19a4307995b8c08b48a6e439eb605d
                                                          • Instruction ID: 5e846190525e9bf34747343504452400a3892af155414519d154682034c143a7
                                                          • Opcode Fuzzy Hash: a10e4dd5c44cc3c821ecd9a6aaee0ce7ea19a4307995b8c08b48a6e439eb605d
                                                          • Instruction Fuzzy Hash: 16510C3125124EDFC70AFF7CF8A09D93BA3BB96204304897AD0448B27EDB716905CB92
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b942d9f2496e08a1c5aa45b4d977ee21d533a95fc46f9a1e713f472d4bf11a0e
                                                          • Instruction ID: 807793083944c65b90152cd794c067b484c5e1ce12d2cba7de475915a2590726
                                                          • Opcode Fuzzy Hash: b942d9f2496e08a1c5aa45b4d977ee21d533a95fc46f9a1e713f472d4bf11a0e
                                                          • Instruction Fuzzy Hash: F9316E31E0021ADBDB65DF69C8806EEB7F2FF89300F208565E505EB281DB71A941CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 735f5e21a6032688aec30cc538fad494a9e28baa9b68feb7ae3c161c9b3d445f
                                                          • Instruction ID: 4c2296ab41297b4287c65e8064cf00c047d836a4c274dbec7ad55431712c89d7
                                                          • Opcode Fuzzy Hash: 735f5e21a6032688aec30cc538fad494a9e28baa9b68feb7ae3c161c9b3d445f
                                                          • Instruction Fuzzy Hash: 5E41F0B0D00348DFEB14DFA9C984ADEBBF5BF48304F148429E809AB250DB75A946CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cae5a283cf66b979a2968d27b8f78a496012eed5f7eb37cdbb3c7f6fc86191f6
                                                          • Instruction ID: 5c7b46a8315167a19c7f47389a10ec21dd1ef56242dc1908f5eb9a113ae5ef8f
                                                          • Opcode Fuzzy Hash: cae5a283cf66b979a2968d27b8f78a496012eed5f7eb37cdbb3c7f6fc86191f6
                                                          • Instruction Fuzzy Hash: 9F313C31E1021ADFEB65DF69C8846EEB7F2EF89300F208569E545EB281E7719941CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 84f796ab1fc44bb636e3a2e00f253fed7fca87773416d5e3ab59079f115cc599
                                                          • Instruction ID: 1437825ec2bf53ecc73ac9128173e7919065840841f662b3f145e088ebc2f57f
                                                          • Opcode Fuzzy Hash: 84f796ab1fc44bb636e3a2e00f253fed7fca87773416d5e3ab59079f115cc599
                                                          • Instruction Fuzzy Hash: 3931363060421ADFDB65EF78D9A46EE77F2AF48204F1008B8D941AB3A5DB769C41CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4a74bd250bc7d9a83ead15454d8f54e5f35188a1968dde8cee9a72a62f1ce0e0
                                                          • Instruction ID: 6c6ffab7d533ac6d6a7db462e84849107a0ec5d3af807e7845668bacaae7dcd4
                                                          • Opcode Fuzzy Hash: 4a74bd250bc7d9a83ead15454d8f54e5f35188a1968dde8cee9a72a62f1ce0e0
                                                          • Instruction Fuzzy Hash: DF41DEB0D00348DFEB14DFA9C884ADEBBF5FF48310F248429E819AB254DB75A945CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 437790d9a705553d62935005eec31d1b9f5d17aedbbc837db7cb85514a86ccd6
                                                          • Instruction ID: 8b536c348f680d8d00865c7226a47ff212b03d2969a7ac403383bedd16876480
                                                          • Opcode Fuzzy Hash: 437790d9a705553d62935005eec31d1b9f5d17aedbbc837db7cb85514a86ccd6
                                                          • Instruction Fuzzy Hash: 00316C34704209DFDB55EB78D9A06EE77F2AF88200F1008B8D941AB398DB36DC41CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fa6ea4d95841d0b111908e6f5d1eb5040b4d543dbc62d086ee2bd308646bae79
                                                          • Instruction ID: e433bc98f724a0314a38fa708a33b50f08831b46dee79da8964560d9ee616e1c
                                                          • Opcode Fuzzy Hash: fa6ea4d95841d0b111908e6f5d1eb5040b4d543dbc62d086ee2bd308646bae79
                                                          • Instruction Fuzzy Hash: 6721F435B002069BDBA1ABBCF8A479E37F6FB8A650F100476E845C7349EB35C8418BC1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6367bd2133029794e641006038f99baf8a382501e7a20d0c15163a8806bfccd8
                                                          • Instruction ID: d7536f78b9c09378271e4f8ef6c0f2a48a3d00a22d4acd2be85c832bb0859f26
                                                          • Opcode Fuzzy Hash: 6367bd2133029794e641006038f99baf8a382501e7a20d0c15163a8806bfccd8
                                                          • Instruction Fuzzy Hash: FD21B031B002168BDB62ABBCA4A02EE77F5EB45250F1004BAE485DB345EB39C8428BD1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5c408a6caef560761c3b51bea446e076d2df4b8b6441215f1552b4f046676955
                                                          • Instruction ID: 4dd5343b3ac2142284523243c64c888233f3583329fe538a6cd70a265d348816
                                                          • Opcode Fuzzy Hash: 5c408a6caef560761c3b51bea446e076d2df4b8b6441215f1552b4f046676955
                                                          • Instruction Fuzzy Hash: 9F31C030F0020ACBDB55CF68C8946DEF7B2BF8A300F14C659E945EB241DB729946CB40
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9a75fd6f47811870d9f2bebfd85267b7f9d21bb2f855cc0e10e8e36ea97de230
                                                          • Instruction ID: 6d4f8e05dd6818c5acd8eb320921051af73050d4278d5215d0a98815d05397ad
                                                          • Opcode Fuzzy Hash: 9a75fd6f47811870d9f2bebfd85267b7f9d21bb2f855cc0e10e8e36ea97de230
                                                          • Instruction Fuzzy Hash: 8121B73460010A8FDB92EB7CF8E47DD33A6FF46204F1049B6D045CB25AEB35D8418B92
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694228052.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_106d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9aa61a5d6bf49782f8e0108e0d963dd94451ec26223f67aa230511279bb87a8c
                                                          • Instruction ID: ff46683f667370c4f5a90600dff62ee00cee5e429ec6111f2ec829e17fbf4ee0
                                                          • Opcode Fuzzy Hash: 9aa61a5d6bf49782f8e0108e0d963dd94451ec26223f67aa230511279bb87a8c
                                                          • Instruction Fuzzy Hash: B33189715093C49FDB13CF64C890711BFB5AF46214F29C5DBD8888F2A3C23A980ACB62
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7786a44bb3649c721b6898e3a32f8091e1db23cdfadd201e25643479dbb107f0
                                                          • Instruction ID: 9685c6789789bc1fc2cd1f8879955d082131b2a0e494eb62af49048699abcb1b
                                                          • Opcode Fuzzy Hash: 7786a44bb3649c721b6898e3a32f8091e1db23cdfadd201e25643479dbb107f0
                                                          • Instruction Fuzzy Hash: 60214D34E1020ADBDB59CFA8D8906DEF7B2BF89300F10866AE945EB345DB7199458B90
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bafc0c1756ec5d79e1add851a8c7ea6d04300ce90fffcb2f671d38d5a2af6f13
                                                          • Instruction ID: 287782c163982d4c41bbb2888628ffde385c75a74a3494f4d50252c24edf79b3
                                                          • Opcode Fuzzy Hash: bafc0c1756ec5d79e1add851a8c7ea6d04300ce90fffcb2f671d38d5a2af6f13
                                                          • Instruction Fuzzy Hash: 2B217170E1020A9BCB15CF68C4906DEB7B2AF89310F10856AE915FB350DB71E845CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 462a0d06ebc90ab4c69dab30faa68c654711435fb3c5ed13dd1adb7d78a33b5d
                                                          • Instruction ID: ae68e7f121df372835521f2068de3e3540f5dddf1c3d33fe2fd6788dfe987e11
                                                          • Opcode Fuzzy Hash: 462a0d06ebc90ab4c69dab30faa68c654711435fb3c5ed13dd1adb7d78a33b5d
                                                          • Instruction Fuzzy Hash: 2121B030B10205DFEB54DB68C894BEE7BF6BF88720F118169E145FB3A4DA718C008B90
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 488dbde5df42ae756d272856a19e7e1633252f37e0dbcd80d642be67e2250321
                                                          • Instruction ID: eec767d97a1e0813fededd70f9b9bca0d0b7b4694996da0b271ed39071a1c10a
                                                          • Opcode Fuzzy Hash: 488dbde5df42ae756d272856a19e7e1633252f37e0dbcd80d642be67e2250321
                                                          • Instruction Fuzzy Hash: 32212730B10209CFCB95EB78C9A8A9D77F1AB89714F1004A8E546EB3A5DB769D01CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694228052.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_106d000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 46a5f365cd750cc8ce968a07e918501bd53b1ce8255f49f7009dd7f9b16e9759
                                                          • Instruction ID: 00c349102591e80515ea77f2adf1edf7c7746cb8c31af440e8cbd4462ec6415a
                                                          • Opcode Fuzzy Hash: 46a5f365cd750cc8ce968a07e918501bd53b1ce8255f49f7009dd7f9b16e9759
                                                          • Instruction Fuzzy Hash: 15212271604204EFEB11DF94D980B26BBA9FB84314F24C5ADE8C94B242C336D847CB62
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d91f08249a986ae67d919793f595bc92f67e00b834330a7727aa83ee9571a286
                                                          • Instruction ID: b6829a15731ea1455007fd90f988981793d93e3ab4ee978ececabf9467075efb
                                                          • Opcode Fuzzy Hash: d91f08249a986ae67d919793f595bc92f67e00b834330a7727aa83ee9571a286
                                                          • Instruction Fuzzy Hash: 6D21A4306002018BEBB2572CF4E83AD37E1EB43311F1044AAE586CF295EB3989858B92
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 92eba6969ed90a39ef151fb02ebf61c667d64a7b1a4a080752b33c25155f349a
                                                          • Instruction ID: a1b3f4024074222179b6e71408c9795fd6ce19dbd34dfcd7429ab22cf5be082f
                                                          • Opcode Fuzzy Hash: 92eba6969ed90a39ef151fb02ebf61c667d64a7b1a4a080752b33c25155f349a
                                                          • Instruction Fuzzy Hash: F4216D30B04249CFDB54EB68D5A47EE77F2AF89200F2004A8D546EB394DB768C40CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9ae5687adbcfd91d7a8178f61293a1e4e06b50d1b01b432637bb06812bcee292
                                                          • Instruction ID: bf7c70930c46163257b0ef555e4a4bc0745ab0d945da3e84d74019445dfee183
                                                          • Opcode Fuzzy Hash: 9ae5687adbcfd91d7a8178f61293a1e4e06b50d1b01b432637bb06812bcee292
                                                          • Instruction Fuzzy Hash: 6A217F70E0020ADBCB19CF68C4906DEB7B2AF89310F10862AF915FB380DB71A945CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05a82021945f21a9eeb964111038c739ea9bc2de6ba9d0603379506e2b219dd6
                                                          • Instruction ID: 43c98e5bc0fb17c6b963618d98fa6445009121a36bdd53536680702d802a903f
                                                          • Opcode Fuzzy Hash: 05a82021945f21a9eeb964111038c739ea9bc2de6ba9d0603379506e2b219dd6
                                                          • Instruction Fuzzy Hash: FB21813460010A8BEBA2E77CF8E479D33A6FB89605F104972D446CB25AEB35D8418B92
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d2b5a80d4ab4a5dcbff38109357e46765ff5db0ac4c5ebf27ea51e20ae841d01
                                                          • Instruction ID: 5cf57e143df625382605a225bd8505cb6c951dab54abb929a6de8b20a853c9a6
                                                          • Opcode Fuzzy Hash: d2b5a80d4ab4a5dcbff38109357e46765ff5db0ac4c5ebf27ea51e20ae841d01
                                                          • Instruction Fuzzy Hash: 3E218C30B04249CFDB65EB68E5A87EE37F2AF49304F2008A8D145EB295DB768C41CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9f2575c52a909321be95ead96e24a15d3e1e10ba3812fd55200cacb48c788bd9
                                                          • Instruction ID: 1b629a69c3770e7431ef007e207b2e875cce427aeae4928237abb4ab16fcac59
                                                          • Opcode Fuzzy Hash: 9f2575c52a909321be95ead96e24a15d3e1e10ba3812fd55200cacb48c788bd9
                                                          • Instruction Fuzzy Hash: 09211934B10209CFDB54EB78D998AAD77F2AF8D710F1004A8E546EB3A5DB769D00CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0a27d7c1d00d9c6b70696a90147ef259d1a66ed7a33884aafcbb105a5708bd79
                                                          • Instruction ID: 44b0defb143f57c87b2c99dc80b3a9a3059f6f31b3c8af4a251a5eedfa60561a
                                                          • Opcode Fuzzy Hash: 0a27d7c1d00d9c6b70696a90147ef259d1a66ed7a33884aafcbb105a5708bd79
                                                          • Instruction Fuzzy Hash: 65119430A003054BEFA69678D8943EF33B1EB42214F1049BAF0C6DF25ADA65CA858BC1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e66fa249347da42de9fbb7473556264ac3c3af1669d9016ecaa0a625698d819
                                                          • Instruction ID: 6494a28b737e13d5a498d4b1fb784db9505f48225300e1811a1ea9242b983842
                                                          • Opcode Fuzzy Hash: 1e66fa249347da42de9fbb7473556264ac3c3af1669d9016ecaa0a625698d819
                                                          • Instruction Fuzzy Hash: 3F119830B002094BEFA5967CD4943AF32A5FB45610F2089B9F0C6CF259DA21CD858BC1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fea3640fb71468cd07e1244c86864500e300e4a48f7a34f211c55748bb543871
                                                          • Instruction ID: f7326e9b1c964e1a821d38d9dd06271925ede8e1649ec42ca8c2851779a05d30
                                                          • Opcode Fuzzy Hash: fea3640fb71468cd07e1244c86864500e300e4a48f7a34f211c55748bb543871
                                                          • Instruction Fuzzy Hash: FA11E9317083519FC3166B78D4642AE7BF2EFCB610B1584EEC199CF691EA3A4C45C792
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 49cdb7c9b0fd64ec79003df22aaa27242d9e893555637cb5cb8a68ae249d8269
                                                          • Instruction ID: d25bb508c24338579e147b6327443fd204a83318bf6470982a72ad83c90762c0
                                                          • Opcode Fuzzy Hash: 49cdb7c9b0fd64ec79003df22aaa27242d9e893555637cb5cb8a68ae249d8269
                                                          • Instruction Fuzzy Hash: 43012D31B002169BCB65EFB994A02EE7BF5EB48260B1404B9E845E7305EB35C8428B95
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7ec448f0bf68ef1792699f4aaa045c1fffa32c4bc2e63a6f82abf79292aea297
                                                          • Instruction ID: 11590537bd3e081ff374c3e6ecb07154973404f6cac735881aaee0a6bc4df359
                                                          • Opcode Fuzzy Hash: 7ec448f0bf68ef1792699f4aaa045c1fffa32c4bc2e63a6f82abf79292aea297
                                                          • Instruction Fuzzy Hash: 10110830A002048FDB14DFA9E9846CABBB2FFC9310F14C1B5C8485F2A6E7B49D05CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 097aebf285577807105a524f83a400829de2df07eb10ea0c94293242c2faa769
                                                          • Instruction ID: 8f53e1e20e59682037a58fd51c3d3f4a7dbc8b377eb9a5a1911e9e44e1adab84
                                                          • Opcode Fuzzy Hash: 097aebf285577807105a524f83a400829de2df07eb10ea0c94293242c2faa769
                                                          • Instruction Fuzzy Hash: EF015A3490020EDFDB85EBB8E9606DC77B2BF85600B1046B9C0459B265EB321E059B91
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cfe44541515940140d576469826dc2aab82449b7d29a387c08988d947c1ddcc0
                                                          • Instruction ID: af8f3bcb28ec195c3c442354cdc2566247d6d69129298cf45d804a7ceaa1dfb4
                                                          • Opcode Fuzzy Hash: cfe44541515940140d576469826dc2aab82449b7d29a387c08988d947c1ddcc0
                                                          • Instruction Fuzzy Hash: AAF0F033A04110DFDB228BA8A8E02ECBFB0FEA922171C00E7D886DB215D736D402CB51
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 28bc925f4d67f732fca6d95202bb7cdc6833b37915dd8151990c5c21dd682c09
                                                          • Instruction ID: 83a832766400ea598839499c6b6df199955f168f0f8950f96c6848b54a04899f
                                                          • Opcode Fuzzy Hash: 28bc925f4d67f732fca6d95202bb7cdc6833b37915dd8151990c5c21dd682c09
                                                          • Instruction Fuzzy Hash: AAF0C435B00118CFC754EB68D5A8A6C77F2EF89715F6444A8E5069B3A4DB36AD02CF40
                                                          Memory Dump Source
                                                          • Source File: 0000000E.00000002.2694645126.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_14_2_10b0000_PpIvKmzUbDB.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 26ec3c04eab5d18f779c920bdd1530163439eefd05552b81945e8ae6171df949
                                                          • Instruction ID: 9171c0fe2bac7948f5334e89e857743f2eabd62d8fd3ddc7e785383fde2f8228
                                                          • Opcode Fuzzy Hash: 26ec3c04eab5d18f779c920bdd1530163439eefd05552b81945e8ae6171df949
                                                          • Instruction Fuzzy Hash: 16F03C3490020EEFDB45FBB8F9A0ADD77B6BF84600F5056B9C0459B258EB322E049B91