Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO for fabric forecast.exe

Overview

General Information

Sample name:PO for fabric forecast.exe
Analysis ID:1570205
MD5:9c0962de2a744a08f331b64edfcf83dd
SHA1:1b063810e15c8df8db6216526d4ee20d0de98b5d
SHA256:37f474ba024470e44cdf908de33a29657d00da334946683d4174daaaa5e71b81
Tags:exeuser-abuse_ch
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PO for fabric forecast.exe (PID: 7480 cmdline: "C:\Users\user\Desktop\PO for fabric forecast.exe" MD5: 9C0962DE2A744A08F331B64EDFCF83DD)
    • powershell.exe (PID: 7668 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7708 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8144 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7752 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PO for fabric forecast.exe (PID: 7912 cmdline: "C:\Users\user\Desktop\PO for fabric forecast.exe" MD5: 9C0962DE2A744A08F331B64EDFCF83DD)
  • QzRJbgyEhZjA.exe (PID: 8060 cmdline: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe MD5: 9C0962DE2A744A08F331B64EDFCF83DD)
    • schtasks.exe (PID: 7268 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • QzRJbgyEhZjA.exe (PID: 2720 cmdline: "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe" MD5: 9C0962DE2A744A08F331B64EDFCF83DD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "admin@iaa-airferight.com", "Password": "manlikeyou88"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.3001652959.0000000002F4E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.3002563146.000000000302E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.1791996165.0000000003CF9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 21 entries
            SourceRuleDescriptionAuthorStrings
            0.2.PO for fabric forecast.exe.9300000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.PO for fabric forecast.exe.3d124e8.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.PO for fabric forecast.exe.9300000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.PO for fabric forecast.exe.40dd7e0.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 28 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO for fabric forecast.exe", ParentImage: C:\Users\user\Desktop\PO for fabric forecast.exe, ParentProcessId: 7480, ParentProcessName: PO for fabric forecast.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", ProcessId: 7668, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO for fabric forecast.exe", ParentImage: C:\Users\user\Desktop\PO for fabric forecast.exe, ParentProcessId: 7480, ParentProcessName: PO for fabric forecast.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", ProcessId: 7668, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe, ParentImage: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe, ParentProcessId: 8060, ParentProcessName: QzRJbgyEhZjA.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp", ProcessId: 7268, ProcessName: schtasks.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\PO for fabric forecast.exe, Initiated: true, ProcessId: 7912, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49733
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PO for fabric forecast.exe", ParentImage: C:\Users\user\Desktop\PO for fabric forecast.exe, ParentProcessId: 7480, ParentProcessName: PO for fabric forecast.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp", ProcessId: 7752, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO for fabric forecast.exe", ParentImage: C:\Users\user\Desktop\PO for fabric forecast.exe, ParentProcessId: 7480, ParentProcessName: PO for fabric forecast.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe", ProcessId: 7668, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PO for fabric forecast.exe", ParentImage: C:\Users\user\Desktop\PO for fabric forecast.exe, ParentProcessId: 7480, ParentProcessName: PO for fabric forecast.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp", ProcessId: 7752, ProcessName: schtasks.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: PO for fabric forecast.exeAvira: detected
                      Source: http://mail.iaa-airferight.comAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeAvira: detection malicious, Label: HEUR/AGEN.1305452
                      Source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "admin@iaa-airferight.com", "Password": "manlikeyou88"}
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeReversingLabs: Detection: 54%
                      Source: PO for fabric forecast.exeReversingLabs: Detection: 54%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeJoe Sandbox ML: detected
                      Source: PO for fabric forecast.exeJoe Sandbox ML: detected
                      Source: PO for fabric forecast.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: PO for fabric forecast.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 4x nop then jmp 0E7A0BCEh0_2_0E7A03B9
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 4x nop then jmp 0AE3F3C6h9_2_0AE3EBB1
                      Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                      Source: Joe Sandbox ViewASN Name: ASLAGIDKOM-NETUA ASLAGIDKOM-NETUA
                      Source: global trafficTCP traffic: 192.168.2.4:49733 -> 46.175.148.58:25
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                      Source: PO for fabric forecast.exe, 00000008.00000002.3002563146.0000000003036000.00000004.00000800.00020000.00000000.sdmp, QzRJbgyEhZjA.exe, 0000000D.00000002.3001652959.0000000002F56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                      Source: PO for fabric forecast.exe, 00000000.00000002.1790846476.00000000027DE000.00000004.00000800.00020000.00000000.sdmp, QzRJbgyEhZjA.exe, 00000009.00000002.1838003802.00000000030AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: PO for fabric forecast.exe, 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, PO for fabric forecast.exe, 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, QzRJbgyEhZjA.exe, 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, SKTzxzsJw.cs.Net Code: sf6jJs8S
                      Source: 0.2.PO for fabric forecast.exe.40dd7e0.1.raw.unpack, SKTzxzsJw.cs.Net Code: sf6jJs8S

                      System Summary

                      barindex
                      Source: 0.2.PO for fabric forecast.exe.40dd7e0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 8.2.PO for fabric forecast.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.PO for fabric forecast.exe.40dd7e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_023322280_2_02332228
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_023373DC0_2_023373DC
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_02332A180_2_02332A18
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_02330E840_2_02330E84
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_023336080_2_02333608
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_023335FA0_2_023335FA
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_093731D80_2_093731D8
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_093700400_2_09370040
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_093731D20_2_093731D2
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_09372E700_2_09372E70
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_09666C500_2_09666C50
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_096628E80_2_096628E8
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_096628D10_2_096628D1
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966BB800_2_0966BB80
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_09666C400_2_09666C40
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_09669C280_2_09669C28
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966A0700_2_0966A070
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_096600400_2_09660040
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_096600120_2_09660012
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966D3B10_2_0966D3B1
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966A4A00_2_0966A4A0
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966A4A80_2_0966A4A8
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966B7480_2_0966B748
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0E7A22A80_2_0E7A22A8
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 8_2_011D9B388_2_011D9B38
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 8_2_011D4A988_2_011D4A98
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 8_2_011DCDB08_2_011DCDB0
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 8_2_011D3E808_2_011D3E80
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 8_2_011D41C88_2_011D41C8
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_011721E09_2_011721E0
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_011773DC9_2_011773DC
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0117A5389_2_0117A538
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_011735F99_2_011735F9
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_011736089_2_01173608
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_093E00409_2_093E0040
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_093E31D89_2_093E31D8
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_093E31D29_2_093E31D2
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_093E2E709_2_093E2E70
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0A9005F09_2_0A9005F0
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE36C509_2_0AE36C50
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE3BB809_2_0AE3BB80
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE328E89_2_0AE328E8
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE328D19_2_0AE328D1
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE36C409_2_0AE36C40
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE39C289_2_0AE39C28
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE39C389_2_0AE39C38
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE3A0709_2_0AE3A070
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE300409_2_0AE30040
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE300079_2_0AE30007
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE3B7489_2_0AE3B748
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE3A4A89_2_0AE3A4A8
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE3A49A9_2_0AE3A49A
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_02D2937813_2_02D29378
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_02D24A9813_2_02D24A98
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_02D29B3813_2_02D29B38
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_02D23E8013_2_02D23E80
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_02D2CDB013_2_02D2CDB0
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_02D241C813_2_02D241C8
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E56D813_2_062E56D8
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E2F0013_2_062E2F00
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E3F4813_2_062E3F48
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062EBD0013_2_062EBD00
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062EDD1013_2_062EDD10
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E9AE013_2_062E9AE0
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E8B9813_2_062E8B98
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E004013_2_062E0040
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E365013_2_062E3650
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 13_2_062E4FF813_2_062E4FF8
                      Source: PO for fabric forecast.exe, 00000000.00000002.1789637397.000000000068E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1803538764.000000000AC60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1791996165.0000000003D32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1790846476.00000000024FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7e5bb978-3a35-43a5-95fe-dd44d69d6a5a.exe4 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1790846476.00000000027DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7e5bb978-3a35-43a5-95fe-dd44d69d6a5a.exe4 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000000.1734972800.000000000013C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamenlzO.exe4 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1791996165.0000000003CF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000000.00000002.1801879709.0000000009300000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7e5bb978-3a35-43a5-95fe-dd44d69d6a5a.exe4 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exe, 00000008.00000002.2999216646.0000000000F58000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exeBinary or memory string: OriginalFilenamenlzO.exe4 vs PO for fabric forecast.exe
                      Source: PO for fabric forecast.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.PO for fabric forecast.exe.40dd7e0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 8.2.PO for fabric forecast.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.PO for fabric forecast.exe.40dd7e0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: PO for fabric forecast.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: QzRJbgyEhZjA.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, kAOj1Y7pfP90kycNNw.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, BEht6nNGxxkendSFT6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, hFfrBx0nBbvPc4vgxD.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, BEht6nNGxxkendSFT6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, BEht6nNGxxkendSFT6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@1/1
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile created: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6016:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMutant created: \Sessions\1\BaseNamedObjects\atBVxLDejnNQhuFjeExBkWtc
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7676:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7804:120:WilError_03
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC3DA.tmpJump to behavior
                      Source: PO for fabric forecast.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: PO for fabric forecast.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: PO for fabric forecast.exeReversingLabs: Detection: 54%
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile read: C:\Users\user\Desktop\PO for fabric forecast.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\PO for fabric forecast.exe "C:\Users\user\Desktop\PO for fabric forecast.exe"
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Users\user\Desktop\PO for fabric forecast.exe "C:\Users\user\Desktop\PO for fabric forecast.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess created: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Users\user\Desktop\PO for fabric forecast.exe "C:\Users\user\Desktop\PO for fabric forecast.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess created: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: PO for fabric forecast.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO for fabric forecast.exeStatic file information: File size 1051648 > 1048576
                      Source: PO for fabric forecast.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, kAOj1Y7pfP90kycNNw.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, kAOj1Y7pfP90kycNNw.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, hFfrBx0nBbvPc4vgxD.cs.Net Code: GWecdIE5Lh System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, GtaAIbrHXObmMm8GPA.cs.Net Code: vaH8QmOOp System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, GtaAIbrHXObmMm8GPA.cs.Net Code: vaH8QmOOp System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, hFfrBx0nBbvPc4vgxD.cs.Net Code: GWecdIE5Lh System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, hFfrBx0nBbvPc4vgxD.cs.Net Code: GWecdIE5Lh System.Reflection.Assembly.Load(byte[])
                      Source: PO for fabric forecast.exeStatic PE information: 0x800448EF [Fri Jan 22 09:14:23 2038 UTC]
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_09669B28 push FFFFFFA4h; retf 0_2_09669B2A
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_09662708 push esi; retf 0_2_0966270B
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeCode function: 0_2_0966263C pushad ; iretd 0_2_0966263D
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE39B21 push FFFFFFA4h; retf 9_2_0AE39B2A
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE3263C pushad ; iretd 9_2_0AE3263D
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeCode function: 9_2_0AE32708 push esi; retf 9_2_0AE3270B
                      Source: PO for fabric forecast.exeStatic PE information: section name: .text entropy: 7.744906030867297
                      Source: QzRJbgyEhZjA.exe.0.drStatic PE information: section name: .text entropy: 7.744906030867297
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, OjOBnushuhVRoB2IcY.csHigh entropy of concatenated method names: 'oeQSUpIynx', 'eqJShLdvNq', 'vQESNJvvcc', 'eF5SsLD5gO', 'iBDSV81Yim', 'VerSw56D6i', 'AtYSiQoBm1', 'RZqSydQSti', 'EswS93IcCM', 'FHcSQR49ls'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, hFfrBx0nBbvPc4vgxD.csHigh entropy of concatenated method names: 'APwBWZcymM', 'DUdBK0GggF', 'NHoBmvYlCK', 'lE3BSAJpK4', 'NccBaG2p0e', 'TCRBOjovsi', 'JmpBMWPVnj', 'mpkB0X0P0U', 'vCZB3yS4YZ', 'K7ZBYaenhd'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, lRPMWv7VIL4RLsgtlc.csHigh entropy of concatenated method names: 'Ol5OW9208E', 'OlMOmv7Brn', 'iv8OagAWij', 'r6kOMi86Dr', 'numO0SpbiJ', 'JKIaXL9ByC', 'q8havhyvXi', 'DlyaZsUkZW', 'WG2a2CnKFg', 'yjnalY12GA'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, HfA1dnL1w8tvGkexIM.csHigh entropy of concatenated method names: 'WWHQSyvJ9w', 'JRWQadfqZl', 'Gr0QOIEMtr', 'WVsQMNtNw1', 'K6xQ9eOohQ', 'pndQ0mS6Th', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, GmYBUlrkE06kXVuyBJd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NwvQetoUuo', 'm0wQAit11b', 'MoQQbOHDFA', 'gIPQ4GUkkd', 'hQoQxg4oSZ', 'sAXQE5SDqI', 'Ik9QP2rUHv'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, D9qORnv59sJbIulm1L.csHigh entropy of concatenated method names: 'g1Qi2UU7g7', 'p1biLs25c3', 'wBgykAkDkE', 'bOxyr2oJ4u', 'euaieEinMF', 'vIqiAk98ib', 'Bv1ibcZhSN', 'i6li46Yf9V', 'll0ixBBSNr', 'OkOiEJEvMA'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, lCSg9Ob0nf0FhnrucK.csHigh entropy of concatenated method names: 'GNdnNP4p86', 'BilnsfIm9l', 'hiVn7sat8g', 'MPUnRW1c95', 'LcmnDUtdGq', 'FI9nqrJfQq', 'sW0nJxFs8K', 'ROOnTX5OBf', 'wO1nC8mwAi', 'FuRneqO4yx'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, Fwx0mKrrX8TCHneEHEZ.csHigh entropy of concatenated method names: 'KvOQL8w23Y', 'TpGQz5nVdF', 'Cd5GkT5GFl', 'cBwGrty9G9', 'RkGG6A9r78', 'EbXGBVV3sa', 'b2PGcjXbiG', 'v1sGWVLc8h', 'kMnGKI8Ngi', 'DUHGmSchwt'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, xRsLG9cJMxAX4AR5gt.csHigh entropy of concatenated method names: 'd31rMEht6n', 'txxr0kendS', 'ChurYhVRoB', 'WIcr5YSn2k', 'XXKrVHDYRP', 'jWvrwVIL4R', 'yXTm9L3OWi0fnt1MgC', 'yVckFwy0RKS6YJ39c6', 'Aeprrf2ch0', 'SBZrBUFbZ3'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, EInat9RUu1XJh0Z49m.csHigh entropy of concatenated method names: 'khFS2tNMjm3Um7GJoT3', 'hhXvKcNwV7wMaTtgXeq', 'NNFWNENcpkAR3Va2mrg', 'Wh2OyiDmLC', 'aEJO9tEhuT', 'SROOQylbxa', 'PNPdfiNb0RSB4L8pxar', 'otNWuDNT8k67KUFflGh'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, yfSSBJm6AgR9Eoem3q.csHigh entropy of concatenated method names: 'Dispose', 'XAdrlAVPGH', 'CMv6RD6x36', 'B1WahtVNGL', 'CymrLta4eD', 'P66rzhZatw', 'ProcessDialogKey', 'S6I6kVKw54', 'T7Z6rNPR88', 'DXb66HfA1d'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, NDfwiJPTGKRv6eiXBO.csHigh entropy of concatenated method names: 'tEfiYViYxH', 'X8yi5AqDas', 'ToString', 'HaaiKgDZN0', 'zKHimHwLI4', 'J5fiSodX4O', 'xdTia2RdCL', 'lXAiOlqf3e', 'mlxiMTpCtv', 'wKti0IoIiu'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, ss9XBZFd16DGTWXvHT.csHigh entropy of concatenated method names: 'JrfMj92VX5', 'OU5MomZq42', 'H96MdjixaR', 'OMFMUMf0ls', 'mViM1eRGtc', 'ALCMhLlNrO', 'FLNMuRERIn', 'd18MNkNYef', 'EX3MsSGF6l', 'cgDMpYCLDa'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, CworMjzNNid5afA3dk.csHigh entropy of concatenated method names: 'EjaQh2ehHI', 'NbxQNW3Ndb', 'U10Qsj5kvG', 'JusQ76MAbc', 'QAMQR3SGdl', 'DHxQDs6lbk', 'madQqHa7NP', 'LwpQfWDNtU', 'AISQjmINPt', 'gQNQo5sADO'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, KLbcNFZUp2AdAVPGHu.csHigh entropy of concatenated method names: 'jmg9VVFUiH', 'e6S9iMWq5j', 'Mxq99Rq4Ix', 'ETY9GPHaDI', 'hx19868wnP', 'xwN9f7NVjl', 'Dispose', 'qbFyKuG6nX', 'v0cym987Wg', 'JJFySYRuPs'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, vVKw54lP7ZNPR88NXb.csHigh entropy of concatenated method names: 'kS7979iHCy', 'Bw19RP60RB', 'zCj9H8hpdx', 'QLY9DrY3KL', 'TBi9qYcFHV', 'cCB9gpBlpC', 't3I9JEqRIP', 'kpK9TPYoVD', 'cij9FbJnWp', 'n269CduF61'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, mlPP6U4AIiJf9IRDX2.csHigh entropy of concatenated method names: 'GmsVCMgENQ', 'wB6VA7dvBe', 'l4LV4LnNLA', 'hR5VxSkTIZ', 'huHVRwGm9u', 'rdiVHJHnEM', 'FskVDtjbms', 'h5cVqZ5PN8', 'R1IVgAmtvA', 'sSIVJWLeWr'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, BEht6nNGxxkendSFT6.csHigh entropy of concatenated method names: 'CtQm4xCphk', 'kClmxIECaI', 'Y6LmE4mEQH', 'vm0mP9muAA', 'aSFmXYKYcf', 'RHHmvdiUUe', 'h8vmZ3FdpR', 'I05m2s63l7', 'dE4ml3vh37', 'etPmLs8lJY'
                      Source: 0.2.PO for fabric forecast.exe.3f42088.3.raw.unpack, FSgpVb6h2DhqWalm3A.csHigh entropy of concatenated method names: 'IDld580Ty', 'fZ3UtsxYX', 'OBnhu7L9A', 'QJYu2y3eZ', 'SNRsKub7q', 'XuapeiiWe', 'tHhWrwpjWN3gYWF9us', 'xCkcMcDsM3P3iU3hmr', 'XVayONawq', 'gaFQs8A5R'
                      Source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, FZaOUuOPvnEAfIAr0M.csHigh entropy of concatenated method names: 'lEA0fIAr0', 'tZCA8AZk9', 'gXO9bmMm8', 'DGw7NTeNK', 'Om2dkTqQy', 'EZYgaiyMO', 'Dispose', 'FZaOOUuPv', 'pv8tyvFJFxYXZkDera', 'y16QeXgcC0F7yngarN'
                      Source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, GtaAIbrHXObmMm8GPA.csHigh entropy of concatenated method names: 't43wlqHDE', 'b331V9lSR', 'y0lQR8D9G', 'PPrmXmJxA', 'CF9acgM2i', 'eykiYV7wh', 'vSMVwpZMk', 'kxKJsuLoh', 'Ny8e5Nb61', 'qdOCMMDun'
                      Source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, kAOj1Y7pfP90kycNNw.csHigh entropy of concatenated method names: 'lb2Ia3XrDtd392xi2Tb', 'XJIblTXQXnFqByJBCJm', 'uLEr9lUTy0', 'Y8R45UX8CExDEFrtuqs', 'ye0NJSX7mZWAZIVVpiG', 'WY1PxJXMKygj5Preg16', 'ELG2kXXJWTZduCJNQBl', 'RgtTUJcyZL', 'wUUrNltvEH', 'CJErdEKrT9'
                      Source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, FZaOUuOPvnEAfIAr0M.csHigh entropy of concatenated method names: 'lEA0fIAr0', 'tZCA8AZk9', 'gXO9bmMm8', 'DGw7NTeNK', 'Om2dkTqQy', 'EZYgaiyMO', 'Dispose', 'FZaOOUuPv', 'pv8tyvFJFxYXZkDera', 'y16QeXgcC0F7yngarN'
                      Source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, GtaAIbrHXObmMm8GPA.csHigh entropy of concatenated method names: 't43wlqHDE', 'b331V9lSR', 'y0lQR8D9G', 'PPrmXmJxA', 'CF9acgM2i', 'eykiYV7wh', 'vSMVwpZMk', 'kxKJsuLoh', 'Ny8e5Nb61', 'qdOCMMDun'
                      Source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, kAOj1Y7pfP90kycNNw.csHigh entropy of concatenated method names: 'lb2Ia3XrDtd392xi2Tb', 'XJIblTXQXnFqByJBCJm', 'uLEr9lUTy0', 'Y8R45UX8CExDEFrtuqs', 'ye0NJSX7mZWAZIVVpiG', 'WY1PxJXMKygj5Preg16', 'ELG2kXXJWTZduCJNQBl', 'RgtTUJcyZL', 'wUUrNltvEH', 'CJErdEKrT9'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, OjOBnushuhVRoB2IcY.csHigh entropy of concatenated method names: 'oeQSUpIynx', 'eqJShLdvNq', 'vQESNJvvcc', 'eF5SsLD5gO', 'iBDSV81Yim', 'VerSw56D6i', 'AtYSiQoBm1', 'RZqSydQSti', 'EswS93IcCM', 'FHcSQR49ls'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, hFfrBx0nBbvPc4vgxD.csHigh entropy of concatenated method names: 'APwBWZcymM', 'DUdBK0GggF', 'NHoBmvYlCK', 'lE3BSAJpK4', 'NccBaG2p0e', 'TCRBOjovsi', 'JmpBMWPVnj', 'mpkB0X0P0U', 'vCZB3yS4YZ', 'K7ZBYaenhd'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, lRPMWv7VIL4RLsgtlc.csHigh entropy of concatenated method names: 'Ol5OW9208E', 'OlMOmv7Brn', 'iv8OagAWij', 'r6kOMi86Dr', 'numO0SpbiJ', 'JKIaXL9ByC', 'q8havhyvXi', 'DlyaZsUkZW', 'WG2a2CnKFg', 'yjnalY12GA'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, HfA1dnL1w8tvGkexIM.csHigh entropy of concatenated method names: 'WWHQSyvJ9w', 'JRWQadfqZl', 'Gr0QOIEMtr', 'WVsQMNtNw1', 'K6xQ9eOohQ', 'pndQ0mS6Th', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, GmYBUlrkE06kXVuyBJd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NwvQetoUuo', 'm0wQAit11b', 'MoQQbOHDFA', 'gIPQ4GUkkd', 'hQoQxg4oSZ', 'sAXQE5SDqI', 'Ik9QP2rUHv'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, D9qORnv59sJbIulm1L.csHigh entropy of concatenated method names: 'g1Qi2UU7g7', 'p1biLs25c3', 'wBgykAkDkE', 'bOxyr2oJ4u', 'euaieEinMF', 'vIqiAk98ib', 'Bv1ibcZhSN', 'i6li46Yf9V', 'll0ixBBSNr', 'OkOiEJEvMA'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, lCSg9Ob0nf0FhnrucK.csHigh entropy of concatenated method names: 'GNdnNP4p86', 'BilnsfIm9l', 'hiVn7sat8g', 'MPUnRW1c95', 'LcmnDUtdGq', 'FI9nqrJfQq', 'sW0nJxFs8K', 'ROOnTX5OBf', 'wO1nC8mwAi', 'FuRneqO4yx'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, Fwx0mKrrX8TCHneEHEZ.csHigh entropy of concatenated method names: 'KvOQL8w23Y', 'TpGQz5nVdF', 'Cd5GkT5GFl', 'cBwGrty9G9', 'RkGG6A9r78', 'EbXGBVV3sa', 'b2PGcjXbiG', 'v1sGWVLc8h', 'kMnGKI8Ngi', 'DUHGmSchwt'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, xRsLG9cJMxAX4AR5gt.csHigh entropy of concatenated method names: 'd31rMEht6n', 'txxr0kendS', 'ChurYhVRoB', 'WIcr5YSn2k', 'XXKrVHDYRP', 'jWvrwVIL4R', 'yXTm9L3OWi0fnt1MgC', 'yVckFwy0RKS6YJ39c6', 'Aeprrf2ch0', 'SBZrBUFbZ3'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, EInat9RUu1XJh0Z49m.csHigh entropy of concatenated method names: 'khFS2tNMjm3Um7GJoT3', 'hhXvKcNwV7wMaTtgXeq', 'NNFWNENcpkAR3Va2mrg', 'Wh2OyiDmLC', 'aEJO9tEhuT', 'SROOQylbxa', 'PNPdfiNb0RSB4L8pxar', 'otNWuDNT8k67KUFflGh'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, yfSSBJm6AgR9Eoem3q.csHigh entropy of concatenated method names: 'Dispose', 'XAdrlAVPGH', 'CMv6RD6x36', 'B1WahtVNGL', 'CymrLta4eD', 'P66rzhZatw', 'ProcessDialogKey', 'S6I6kVKw54', 'T7Z6rNPR88', 'DXb66HfA1d'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, NDfwiJPTGKRv6eiXBO.csHigh entropy of concatenated method names: 'tEfiYViYxH', 'X8yi5AqDas', 'ToString', 'HaaiKgDZN0', 'zKHimHwLI4', 'J5fiSodX4O', 'xdTia2RdCL', 'lXAiOlqf3e', 'mlxiMTpCtv', 'wKti0IoIiu'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, ss9XBZFd16DGTWXvHT.csHigh entropy of concatenated method names: 'JrfMj92VX5', 'OU5MomZq42', 'H96MdjixaR', 'OMFMUMf0ls', 'mViM1eRGtc', 'ALCMhLlNrO', 'FLNMuRERIn', 'd18MNkNYef', 'EX3MsSGF6l', 'cgDMpYCLDa'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, CworMjzNNid5afA3dk.csHigh entropy of concatenated method names: 'EjaQh2ehHI', 'NbxQNW3Ndb', 'U10Qsj5kvG', 'JusQ76MAbc', 'QAMQR3SGdl', 'DHxQDs6lbk', 'madQqHa7NP', 'LwpQfWDNtU', 'AISQjmINPt', 'gQNQo5sADO'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, KLbcNFZUp2AdAVPGHu.csHigh entropy of concatenated method names: 'jmg9VVFUiH', 'e6S9iMWq5j', 'Mxq99Rq4Ix', 'ETY9GPHaDI', 'hx19868wnP', 'xwN9f7NVjl', 'Dispose', 'qbFyKuG6nX', 'v0cym987Wg', 'JJFySYRuPs'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, vVKw54lP7ZNPR88NXb.csHigh entropy of concatenated method names: 'kS7979iHCy', 'Bw19RP60RB', 'zCj9H8hpdx', 'QLY9DrY3KL', 'TBi9qYcFHV', 'cCB9gpBlpC', 't3I9JEqRIP', 'kpK9TPYoVD', 'cij9FbJnWp', 'n269CduF61'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, mlPP6U4AIiJf9IRDX2.csHigh entropy of concatenated method names: 'GmsVCMgENQ', 'wB6VA7dvBe', 'l4LV4LnNLA', 'hR5VxSkTIZ', 'huHVRwGm9u', 'rdiVHJHnEM', 'FskVDtjbms', 'h5cVqZ5PN8', 'R1IVgAmtvA', 'sSIVJWLeWr'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, BEht6nNGxxkendSFT6.csHigh entropy of concatenated method names: 'CtQm4xCphk', 'kClmxIECaI', 'Y6LmE4mEQH', 'vm0mP9muAA', 'aSFmXYKYcf', 'RHHmvdiUUe', 'h8vmZ3FdpR', 'I05m2s63l7', 'dE4ml3vh37', 'etPmLs8lJY'
                      Source: 0.2.PO for fabric forecast.exe.3fc0ca8.5.raw.unpack, FSgpVb6h2DhqWalm3A.csHigh entropy of concatenated method names: 'IDld580Ty', 'fZ3UtsxYX', 'OBnhu7L9A', 'QJYu2y3eZ', 'SNRsKub7q', 'XuapeiiWe', 'tHhWrwpjWN3gYWF9us', 'xCkcMcDsM3P3iU3hmr', 'XVayONawq', 'gaFQs8A5R'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, OjOBnushuhVRoB2IcY.csHigh entropy of concatenated method names: 'oeQSUpIynx', 'eqJShLdvNq', 'vQESNJvvcc', 'eF5SsLD5gO', 'iBDSV81Yim', 'VerSw56D6i', 'AtYSiQoBm1', 'RZqSydQSti', 'EswS93IcCM', 'FHcSQR49ls'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, hFfrBx0nBbvPc4vgxD.csHigh entropy of concatenated method names: 'APwBWZcymM', 'DUdBK0GggF', 'NHoBmvYlCK', 'lE3BSAJpK4', 'NccBaG2p0e', 'TCRBOjovsi', 'JmpBMWPVnj', 'mpkB0X0P0U', 'vCZB3yS4YZ', 'K7ZBYaenhd'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, lRPMWv7VIL4RLsgtlc.csHigh entropy of concatenated method names: 'Ol5OW9208E', 'OlMOmv7Brn', 'iv8OagAWij', 'r6kOMi86Dr', 'numO0SpbiJ', 'JKIaXL9ByC', 'q8havhyvXi', 'DlyaZsUkZW', 'WG2a2CnKFg', 'yjnalY12GA'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, HfA1dnL1w8tvGkexIM.csHigh entropy of concatenated method names: 'WWHQSyvJ9w', 'JRWQadfqZl', 'Gr0QOIEMtr', 'WVsQMNtNw1', 'K6xQ9eOohQ', 'pndQ0mS6Th', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, GmYBUlrkE06kXVuyBJd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NwvQetoUuo', 'm0wQAit11b', 'MoQQbOHDFA', 'gIPQ4GUkkd', 'hQoQxg4oSZ', 'sAXQE5SDqI', 'Ik9QP2rUHv'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, D9qORnv59sJbIulm1L.csHigh entropy of concatenated method names: 'g1Qi2UU7g7', 'p1biLs25c3', 'wBgykAkDkE', 'bOxyr2oJ4u', 'euaieEinMF', 'vIqiAk98ib', 'Bv1ibcZhSN', 'i6li46Yf9V', 'll0ixBBSNr', 'OkOiEJEvMA'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, lCSg9Ob0nf0FhnrucK.csHigh entropy of concatenated method names: 'GNdnNP4p86', 'BilnsfIm9l', 'hiVn7sat8g', 'MPUnRW1c95', 'LcmnDUtdGq', 'FI9nqrJfQq', 'sW0nJxFs8K', 'ROOnTX5OBf', 'wO1nC8mwAi', 'FuRneqO4yx'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, Fwx0mKrrX8TCHneEHEZ.csHigh entropy of concatenated method names: 'KvOQL8w23Y', 'TpGQz5nVdF', 'Cd5GkT5GFl', 'cBwGrty9G9', 'RkGG6A9r78', 'EbXGBVV3sa', 'b2PGcjXbiG', 'v1sGWVLc8h', 'kMnGKI8Ngi', 'DUHGmSchwt'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, xRsLG9cJMxAX4AR5gt.csHigh entropy of concatenated method names: 'd31rMEht6n', 'txxr0kendS', 'ChurYhVRoB', 'WIcr5YSn2k', 'XXKrVHDYRP', 'jWvrwVIL4R', 'yXTm9L3OWi0fnt1MgC', 'yVckFwy0RKS6YJ39c6', 'Aeprrf2ch0', 'SBZrBUFbZ3'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, EInat9RUu1XJh0Z49m.csHigh entropy of concatenated method names: 'khFS2tNMjm3Um7GJoT3', 'hhXvKcNwV7wMaTtgXeq', 'NNFWNENcpkAR3Va2mrg', 'Wh2OyiDmLC', 'aEJO9tEhuT', 'SROOQylbxa', 'PNPdfiNb0RSB4L8pxar', 'otNWuDNT8k67KUFflGh'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, yfSSBJm6AgR9Eoem3q.csHigh entropy of concatenated method names: 'Dispose', 'XAdrlAVPGH', 'CMv6RD6x36', 'B1WahtVNGL', 'CymrLta4eD', 'P66rzhZatw', 'ProcessDialogKey', 'S6I6kVKw54', 'T7Z6rNPR88', 'DXb66HfA1d'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, NDfwiJPTGKRv6eiXBO.csHigh entropy of concatenated method names: 'tEfiYViYxH', 'X8yi5AqDas', 'ToString', 'HaaiKgDZN0', 'zKHimHwLI4', 'J5fiSodX4O', 'xdTia2RdCL', 'lXAiOlqf3e', 'mlxiMTpCtv', 'wKti0IoIiu'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, ss9XBZFd16DGTWXvHT.csHigh entropy of concatenated method names: 'JrfMj92VX5', 'OU5MomZq42', 'H96MdjixaR', 'OMFMUMf0ls', 'mViM1eRGtc', 'ALCMhLlNrO', 'FLNMuRERIn', 'd18MNkNYef', 'EX3MsSGF6l', 'cgDMpYCLDa'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, CworMjzNNid5afA3dk.csHigh entropy of concatenated method names: 'EjaQh2ehHI', 'NbxQNW3Ndb', 'U10Qsj5kvG', 'JusQ76MAbc', 'QAMQR3SGdl', 'DHxQDs6lbk', 'madQqHa7NP', 'LwpQfWDNtU', 'AISQjmINPt', 'gQNQo5sADO'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, KLbcNFZUp2AdAVPGHu.csHigh entropy of concatenated method names: 'jmg9VVFUiH', 'e6S9iMWq5j', 'Mxq99Rq4Ix', 'ETY9GPHaDI', 'hx19868wnP', 'xwN9f7NVjl', 'Dispose', 'qbFyKuG6nX', 'v0cym987Wg', 'JJFySYRuPs'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, vVKw54lP7ZNPR88NXb.csHigh entropy of concatenated method names: 'kS7979iHCy', 'Bw19RP60RB', 'zCj9H8hpdx', 'QLY9DrY3KL', 'TBi9qYcFHV', 'cCB9gpBlpC', 't3I9JEqRIP', 'kpK9TPYoVD', 'cij9FbJnWp', 'n269CduF61'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, mlPP6U4AIiJf9IRDX2.csHigh entropy of concatenated method names: 'GmsVCMgENQ', 'wB6VA7dvBe', 'l4LV4LnNLA', 'hR5VxSkTIZ', 'huHVRwGm9u', 'rdiVHJHnEM', 'FskVDtjbms', 'h5cVqZ5PN8', 'R1IVgAmtvA', 'sSIVJWLeWr'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, BEht6nNGxxkendSFT6.csHigh entropy of concatenated method names: 'CtQm4xCphk', 'kClmxIECaI', 'Y6LmE4mEQH', 'vm0mP9muAA', 'aSFmXYKYcf', 'RHHmvdiUUe', 'h8vmZ3FdpR', 'I05m2s63l7', 'dE4ml3vh37', 'etPmLs8lJY'
                      Source: 0.2.PO for fabric forecast.exe.ac60000.7.raw.unpack, FSgpVb6h2DhqWalm3A.csHigh entropy of concatenated method names: 'IDld580Ty', 'fZ3UtsxYX', 'OBnhu7L9A', 'QJYu2y3eZ', 'SNRsKub7q', 'XuapeiiWe', 'tHhWrwpjWN3gYWF9us', 'xCkcMcDsM3P3iU3hmr', 'XVayONawq', 'gaFQs8A5R'
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile created: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7480, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 8060, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 2290000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 24F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 2290000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 4B30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 5B30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 5C60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 6C60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: ACE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: BCE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: C170000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: D170000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 2FE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: F10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 12D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 5280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 6280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 63B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 73B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: AE40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: BE40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: C2D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: D2D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 2CE0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 2F00000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory allocated: 2D50000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4869Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6631Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 361Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWindow / User API: threadDelayed 4901Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWindow / User API: threadDelayed 4920Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWindow / User API: threadDelayed 7515
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWindow / User API: threadDelayed 2341
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 7500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7996Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7872Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8020Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7968Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep count: 38 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -35048813740048126s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8120Thread sleep count: 4901 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99516s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8120Thread sleep count: 4920 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99404s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99297s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep count: 35 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -99047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98563s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98438s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98329s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98204s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -98079s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97954s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97829s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97704s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97579s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97454s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97297s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -97063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96703s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96469s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -96110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -95110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -94110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exe TID: 8096Thread sleep time: -93984s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 8132Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep count: 34 > 30
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -31359464925306218s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -100000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99875s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 4488Thread sleep count: 7515 > 30
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99766s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 4488Thread sleep count: 2341 > 30
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99643s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99516s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99406s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99297s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99188s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -99078s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98968s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98859s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98749s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98626s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98500s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98391s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98281s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98171s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -98063s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97938s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97828s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97719s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97594s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97484s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97372s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -97193s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96791s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96676s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96547s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96438s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96313s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96203s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -96094s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95969s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95859s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95750s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95640s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95529s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95422s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95312s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95203s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -95094s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94969s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94859s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94749s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94641s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94531s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94422s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94312s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94203s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe TID: 2488Thread sleep time: -94059s >= -30000s
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99860Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99734Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99624Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99516Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99404Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99297Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 99047Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98938Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98813Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98688Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98563Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98438Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98329Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98204Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 98079Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97954Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97829Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97704Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97579Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97454Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97297Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97188Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 97063Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96938Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96813Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96703Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96594Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96469Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96360Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96235Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 96110Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95985Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95860Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95735Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95610Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95485Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95360Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95235Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 95110Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94985Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94860Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94735Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94610Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94485Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94360Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94235Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 94110Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeThread delayed: delay time: 93984Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 100000
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99875
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99766
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99643
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99516
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99406
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99297
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99188
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 99078
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98968
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98859
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98749
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98626
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98500
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98391
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98281
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98171
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 98063
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97938
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97828
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97719
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97594
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97484
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97372
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 97193
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96791
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96676
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96547
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96438
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96313
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96203
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 96094
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95969
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95859
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95750
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95640
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95529
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95422
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95312
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95203
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 95094
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94969
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94859
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94749
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94641
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94531
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94422
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94312
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94203
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeThread delayed: delay time: 94059
                      Source: QzRJbgyEhZjA.exe, 00000009.00000002.1843280541.0000000009563000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                      Source: PO for fabric forecast.exe, 00000008.00000002.3000123684.00000000012A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                      Source: QzRJbgyEhZjA.exe, 0000000D.00000002.2999786788.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe"
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeMemory written: C:\Users\user\Desktop\PO for fabric forecast.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeMemory written: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeProcess created: C:\Users\user\Desktop\PO for fabric forecast.exe "C:\Users\user\Desktop\PO for fabric forecast.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeProcess created: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Users\user\Desktop\PO for fabric forecast.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Users\user\Desktop\PO for fabric forecast.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40dd7e0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40a2dc0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.PO for fabric forecast.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40dd7e0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000D.00000002.3001652959.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3002563146.000000000302E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.3001652959.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3002563146.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7480, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7912, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 8060, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 2720, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.9300000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.3d124e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.2e462e4.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.2577b50.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1791996165.0000000003CF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1801879709.0000000009300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1838003802.0000000002DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1790846476.00000000024FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\PO for fabric forecast.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40dd7e0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40a2dc0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.PO for fabric forecast.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40dd7e0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.3001652959.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3002563146.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7480, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7912, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 8060, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 2720, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40dd7e0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40a2dc0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.PO for fabric forecast.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40dd7e0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49ae3e0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.40a2dc0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.49739c0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000D.00000002.3001652959.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3002563146.000000000302E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.3001652959.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3002563146.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7480, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO for fabric forecast.exe PID: 7912, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 8060, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QzRJbgyEhZjA.exe PID: 2720, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.9300000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.3d124e8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.3d124e8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.9300000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.QzRJbgyEhZjA.exe.2e462e4.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO for fabric forecast.exe.2577b50.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1791996165.0000000003CF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1801879709.0000000009300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1838003802.0000000002DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1790846476.00000000024FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Scheduled Task/Job
                      3
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      211
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      11
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      Protocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets141
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570205 Sample: PO for fabric forecast.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 46 mail.iaa-airferight.com 2->46 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for URL or domain 2->54 56 15 other signatures 2->56 8 PO for fabric forecast.exe 7 2->8         started        12 QzRJbgyEhZjA.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\QzRJbgyEhZjA.exe, PE32 8->38 dropped 40 C:\Users\...\QzRJbgyEhZjA.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmpC3DA.tmp, XML 8->42 dropped 44 C:\Users\...\PO for fabric forecast.exe.log, ASCII 8->44 dropped 58 Adds a directory exclusion to Windows Defender 8->58 60 Injects a PE file into a foreign processes 8->60 14 PO for fabric forecast.exe 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        62 Antivirus detection for dropped file 12->62 64 Multi AV Scanner detection for dropped file 12->64 66 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->66 68 Machine Learning detection for dropped file 12->68 24 QzRJbgyEhZjA.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 48 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->48 70 Loading BitLocker PowerShell Module 18->70 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        72 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->72 74 Tries to steal Mail credentials (via file / registry access) 24->74 76 Tries to harvest and steal ftp login credentials 24->76 78 Tries to harvest and steal browser information (history, passwords, etc) 24->78 36 conhost.exe 26->36         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      PO for fabric forecast.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      PO for fabric forecast.exe100%AviraHEUR/AGEN.1305452
                      PO for fabric forecast.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe100%AviraHEUR/AGEN.1305452
                      C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://mail.iaa-airferight.com100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.iaa-airferight.com
                      46.175.148.58
                      truetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bThePO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://account.dyn.com/PO for fabric forecast.exe, 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, PO for fabric forecast.exe, 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, QzRJbgyEhZjA.exe, 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers?PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://mail.iaa-airferight.comPO for fabric forecast.exe, 00000008.00000002.3002563146.0000000003036000.00000004.00000800.00020000.00000000.sdmp, QzRJbgyEhZjA.exe, 0000000D.00000002.3001652959.0000000002F56000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.tiro.comPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designersPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comlPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.sajatypeworks.comPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.typography.netDPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.com/designers/cabarga.htmlNPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cn/cThePO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.galapagosdesign.com/staff/dennis.htmPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cnPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.com/designers/frere-user.htmlPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.jiyu-kobo.co.jp/PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.galapagosdesign.com/DPleasePO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.fontbureau.com/designers8PO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.fonts.comPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.sandoll.co.krPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.urwpp.deDPleasePO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.zhongyicts.com.cnPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO for fabric forecast.exe, 00000000.00000002.1790846476.00000000027DE000.00000004.00000800.00020000.00000000.sdmp, QzRJbgyEhZjA.exe, 00000009.00000002.1838003802.00000000030AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.sakkal.comPO for fabric forecast.exe, 00000000.00000002.1800318696.0000000008B32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              46.175.148.58
                                                                              mail.iaa-airferight.comUkraine
                                                                              56394ASLAGIDKOM-NETUAtrue
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1570205
                                                                              Start date and time:2024-12-06 16:38:06 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 7m 12s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:18
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:PO for fabric forecast.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@19/15@1/1
                                                                              EGA Information:
                                                                              • Successful, ratio: 75%
                                                                              HCA Information:
                                                                              • Successful, ratio: 98%
                                                                              • Number of executed functions: 167
                                                                              • Number of non-executed functions: 15
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Execution Graph export aborted for target PO for fabric forecast.exe, PID 7912 because it is empty
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                              • Report size getting too big, too many NtCreateKey calls found.
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • VT rate limit hit for: PO for fabric forecast.exe
                                                                              TimeTypeDescription
                                                                              10:39:04API Interceptor175x Sleep call for process: PO for fabric forecast.exe modified
                                                                              10:39:06API Interceptor39x Sleep call for process: powershell.exe modified
                                                                              10:39:10API Interceptor178x Sleep call for process: QzRJbgyEhZjA.exe modified
                                                                              15:39:08Task SchedulerRun new task: QzRJbgyEhZjA path: C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              46.175.148.58980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                    RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                            2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  mail.iaa-airferight.com980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                  • 46.175.148.58
                                                                                                  RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  ASLAGIDKOM-NETUA980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                  • 46.175.148.58
                                                                                                  RFQ ENQ186 OI REQUIRE RATE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  l6F8Xgr0Ov.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  SPlVyHiGOz.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  2bOizaPPDC.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  McEdhqMMhs.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  55qIbHIAZi.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                                  • 46.175.148.58
                                                                                                  No context
                                                                                                  No context
                                                                                                  Process:C:\Users\user\Desktop\PO for fabric forecast.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1216
                                                                                                  Entropy (8bit):5.34331486778365
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                  Malicious:true
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                  Process:C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1216
                                                                                                  Entropy (8bit):5.34331486778365
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                  Malicious:false
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):2232
                                                                                                  Entropy (8bit):5.379736180876081
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZSUyus:tLHyIFKL3IZ2KRH9OugEs
                                                                                                  MD5:72F35C292A6859CB7CFB21D40EC3D2F8
                                                                                                  SHA1:96F18AB9B3CF301A61D0ABE374AB33B8EB864884
                                                                                                  SHA-256:9CC6A174C97D345DA67AA1F586EAF5911BE61B92B75E0FB283BE338B45BA4325
                                                                                                  SHA-512:B6DA5E7BE2F9D1AB05403801395524C1EFCB843747BF2C302BF8A5690A9197ED01B909852368F4A71D77EA2400085F629FF666869042A4D0A432836DF1DFD5B0
                                                                                                  Malicious:false
                                                                                                  Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Users\user\Desktop\PO for fabric forecast.exe
                                                                                                  File Type:XML 1.0 document, ASCII text
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1578
                                                                                                  Entropy (8bit):5.124552106596694
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaKLxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT31v
                                                                                                  MD5:BA4EC9E3B0C3A35E154FCDAB59AE06B5
                                                                                                  SHA1:E9726F8AD09D9A594A2FEEB0150192BF2683FD99
                                                                                                  SHA-256:982DD3D9F7A119FCDB3FAAFE89D9984B8FD827F8D38806F5E9FD97EAC74A8E78
                                                                                                  SHA-512:1EA01040ABA13E6837C00881B9AB2BA341A8A38DEDFE4CE4FAF969243AD7AE80AF62615E295E202156D1D32DBE3CC3A26CD055B7C893DDCAA73943FBB3C2C7BC
                                                                                                  Malicious:true
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                  Process:C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                                                                                                  File Type:XML 1.0 document, ASCII text
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1578
                                                                                                  Entropy (8bit):5.124552106596694
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaKLxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT31v
                                                                                                  MD5:BA4EC9E3B0C3A35E154FCDAB59AE06B5
                                                                                                  SHA1:E9726F8AD09D9A594A2FEEB0150192BF2683FD99
                                                                                                  SHA-256:982DD3D9F7A119FCDB3FAAFE89D9984B8FD827F8D38806F5E9FD97EAC74A8E78
                                                                                                  SHA-512:1EA01040ABA13E6837C00881B9AB2BA341A8A38DEDFE4CE4FAF969243AD7AE80AF62615E295E202156D1D32DBE3CC3A26CD055B7C893DDCAA73943FBB3C2C7BC
                                                                                                  Malicious:false
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                  Process:C:\Users\user\Desktop\PO for fabric forecast.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1051648
                                                                                                  Entropy (8bit):7.357511061191052
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24576:H/n1zGUxj/DXD08uzeE9V3FHc2ApvkmYD2TmTCItSRcbyiL:fNLNjDro1V1HGMm62CnSaPL
                                                                                                  MD5:9C0962DE2A744A08F331B64EDFCF83DD
                                                                                                  SHA1:1B063810E15C8DF8DB6216526D4EE20D0DE98B5D
                                                                                                  SHA-256:37F474BA024470E44CDF908DE33A29657D00DA334946683D4174DAAAA5E71B81
                                                                                                  SHA-512:299D58839CED879299816895F6131831739B899EE12B98ACC944C809F4828EB0A057DC068FED199B1CF2CACF7ACC2B27B81E6A3F099638594295B46F62186D86
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 54%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H................0.................. ........@.. ....................................@....................................K............................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc.......`......................@..B........................H....... ...............p....*..........................................\.X^..Q..YBJ.Zl.p.....z./....mQ#.9..Z......K.`.Q....7X.K6w.U.&...y....s.....'a@yR..PXe,].x.GH9$..%B...4en....8..t..WO.2.e..R......u...Tn.s..h.|...........R.....Q#.&.....b1[...[..O.U...M..0......._.PNe....$...M+......5.l...-..m....gI.h..UYf..e.[^... ...6.9n.L|.......a.#T..F.X.e....X...Ue.{s.U....k...O_.flny%..z>@2?...j......m.=..M...Yk..h...*s.3...@...Y=...=.uQ..VJ...z....I......@.1......
                                                                                                  Process:C:\Users\user\Desktop\PO for fabric forecast.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):26
                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                  Malicious:true
                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):7.357511061191052
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                                  File name:PO for fabric forecast.exe
                                                                                                  File size:1'051'648 bytes
                                                                                                  MD5:9c0962de2a744a08f331b64edfcf83dd
                                                                                                  SHA1:1b063810e15c8df8db6216526d4ee20d0de98b5d
                                                                                                  SHA256:37f474ba024470e44cdf908de33a29657d00da334946683d4174daaaa5e71b81
                                                                                                  SHA512:299d58839ced879299816895f6131831739b899ee12b98acc944c809f4828eb0a057dc068fed199b1cf2cacf7acc2b27b81e6a3f099638594295b46f62186d86
                                                                                                  SSDEEP:24576:H/n1zGUxj/DXD08uzeE9V3FHc2ApvkmYD2TmTCItSRcbyiL:fNLNjDro1V1HGMm62CnSaPL
                                                                                                  TLSH:5225CF897500B19ECC56CB304A35CD3457202CAEAB3AC21FA5E73DAB7F7E5D799140A2
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H................0.................. ........@.. ....................................@................................
                                                                                                  Icon Hash:c5949296969e8473
                                                                                                  Entrypoint:0x4ca41e
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x800448EF [Fri Jan 22 09:14:23 2038 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xca3d00x4b.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x380e0.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1060000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000xc84240xc8600e5f153da4e3af5b45acf6c14c2762f4dFalse0.8869368469276356data7.744906030867297IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0xcc0000x380e00x3820043881f68e1b132e4feea170ffd9836ebFalse0.30785860940979953data5.197555802374114IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x1060000xc0x2001b89e1a08d4adbad36c2883833bdad13False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0xcc4900x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.38353658536585367
                                                                                                  RT_ICON0xccaf80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.48655913978494625
                                                                                                  RT_ICON0xccde00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.5286885245901639
                                                                                                  RT_ICON0xccfc80x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5878378378378378
                                                                                                  RT_ICON0xcd0f00x6739PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9933017975402081
                                                                                                  RT_ICON0xd382c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.5578358208955224
                                                                                                  RT_ICON0xd46d40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.6367328519855595
                                                                                                  RT_ICON0xd4f7c0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.6497695852534562
                                                                                                  RT_ICON0xd56440x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.47760115606936415
                                                                                                  RT_ICON0xd5bac0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.125
                                                                                                  RT_ICON0xe63d40x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.21113622030691612
                                                                                                  RT_ICON0xef87c0x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 265600.21157894736842106
                                                                                                  RT_ICON0xf60640x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.24269870609981517
                                                                                                  RT_ICON0xfb4ec0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.22325224374114314
                                                                                                  RT_ICON0xff7140x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.3196058091286307
                                                                                                  RT_ICON0x101cbc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.3642120075046904
                                                                                                  RT_ICON0x102d640x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5086065573770492
                                                                                                  RT_ICON0x1036ec0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5735815602836879
                                                                                                  RT_GROUP_ICON0x103b540x102data0.5697674418604651
                                                                                                  RT_GROUP_ICON0x103c580x14data1.05
                                                                                                  RT_VERSION0x103c6c0x288data0.46141975308641975
                                                                                                  RT_MANIFEST0x103ef40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 6, 2024 16:39:10.720956087 CET4973325192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:11.758277893 CET4973325192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:13.713367939 CET4973625192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:13.769438028 CET4973325192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:14.883951902 CET4973625192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:16.883955002 CET4973625192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:17.774563074 CET4973325192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:20.883960009 CET4973625192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:25.790224075 CET4973325192.168.2.446.175.148.58
                                                                                                  Dec 6, 2024 16:39:28.899611950 CET4973625192.168.2.446.175.148.58
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 6, 2024 16:39:10.476418972 CET6462753192.168.2.41.1.1.1
                                                                                                  Dec 6, 2024 16:39:10.711426020 CET53646271.1.1.1192.168.2.4
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Dec 6, 2024 16:39:10.476418972 CET192.168.2.41.1.1.10x8162Standard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Dec 6, 2024 16:39:10.711426020 CET1.1.1.1192.168.2.40x8162No error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false

                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:10:39:03
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Users\user\Desktop\PO for fabric forecast.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\PO for fabric forecast.exe"
                                                                                                  Imagebase:0x70000
                                                                                                  File size:1'051'648 bytes
                                                                                                  MD5 hash:9C0962DE2A744A08F331B64EDFCF83DD
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1791996165.0000000003CF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1801879709.0000000009300000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1791996165.00000000040A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1790846476.00000000024FC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:2
                                                                                                  Start time:10:39:05
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO for fabric forecast.exe"
                                                                                                  Imagebase:0xb70000
                                                                                                  File size:433'152 bytes
                                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:10:39:06
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:10:39:06
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"
                                                                                                  Imagebase:0xb70000
                                                                                                  File size:433'152 bytes
                                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:5
                                                                                                  Start time:10:39:06
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:10:39:06
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DA.tmp"
                                                                                                  Imagebase:0x260000
                                                                                                  File size:187'904 bytes
                                                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:10:39:06
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:8
                                                                                                  Start time:10:39:06
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Users\user\Desktop\PO for fabric forecast.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\PO for fabric forecast.exe"
                                                                                                  Imagebase:0xab0000
                                                                                                  File size:1'051'648 bytes
                                                                                                  MD5 hash:9C0962DE2A744A08F331B64EDFCF83DD
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3002563146.000000000302E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2998685644.0000000000433000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3002563146.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3002563146.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:9
                                                                                                  Start time:10:39:08
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                                                                                                  Imagebase:0x7b0000
                                                                                                  File size:1'051'648 bytes
                                                                                                  MD5 hash:9C0962DE2A744A08F331B64EDFCF83DD
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1840100108.0000000004973000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1838003802.0000000002DC9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 54%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:10
                                                                                                  Start time:10:39:09
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                  Imagebase:0x7ff693ab0000
                                                                                                  File size:496'640 bytes
                                                                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:false

                                                                                                  Target ID:11
                                                                                                  Start time:10:39:11
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRJbgyEhZjA" /XML "C:\Users\user\AppData\Local\Temp\tmpD697.tmp"
                                                                                                  Imagebase:0x260000
                                                                                                  File size:187'904 bytes
                                                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:12
                                                                                                  Start time:10:39:11
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:13
                                                                                                  Start time:10:39:11
                                                                                                  Start date:06/12/2024
                                                                                                  Path:C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\QzRJbgyEhZjA.exe"
                                                                                                  Imagebase:0x9a0000
                                                                                                  File size:1'051'648 bytes
                                                                                                  MD5 hash:9C0962DE2A744A08F331B64EDFCF83DD
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.3001652959.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.3001652959.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.3001652959.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Has exited:false

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:12.3%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:181
                                                                                                    Total number of Limit Nodes:9
                                                                                                    execution_graph 30876 e7a0f38 30877 e7a10c3 30876->30877 30878 e7a0f5e 30876->30878 30878->30877 30881 e7a11b4 30878->30881 30884 e7a11b8 PostMessageW 30878->30884 30882 e7a11b8 PostMessageW 30881->30882 30883 e7a1224 30882->30883 30883->30878 30885 e7a1224 30884->30885 30885->30878 30886 233e560 30887 233e5a2 30886->30887 30888 233e5a8 GetModuleHandleW 30886->30888 30887->30888 30889 233e5d5 30888->30889 30920 2337810 30921 233781b 30920->30921 30923 2337948 30920->30923 30924 233796d 30923->30924 30928 2337e60 30924->30928 30932 2337e50 30924->30932 30930 2337e87 30928->30930 30929 2337f64 30929->30929 30930->30929 30936 2337aac 30930->30936 30934 2337e87 30932->30934 30933 2337f64 30933->30933 30934->30933 30935 2337aac CreateActCtxA 30934->30935 30935->30933 30937 2338ef0 CreateActCtxA 30936->30937 30939 2338fb3 30937->30939 30890 9375ee0 30891 9375eeb 30890->30891 30894 9375f00 30890->30894 30905 9375ef0 30890->30905 30896 9375f15 30894->30896 30895 9375f9b 30903 9375f00 GetCurrentThreadId 30895->30903 30904 9375ef0 GetCurrentThreadId 30895->30904 30896->30895 30897 9375fd0 30896->30897 30902 93760d4 30897->30902 30916 93750dc 30897->30916 30898 9375fa5 30898->30891 30901 93750dc GetCurrentThreadId 30901->30902 30902->30891 30903->30898 30904->30898 30907 9375f00 30905->30907 30906 9375f9b 30914 9375f00 GetCurrentThreadId 30906->30914 30915 9375ef0 GetCurrentThreadId 30906->30915 30907->30906 30909 9375fd0 30907->30909 30908 9375fa5 30908->30891 30910 93750dc GetCurrentThreadId 30909->30910 30913 93760d4 30909->30913 30911 93760f8 30910->30911 30912 93750dc GetCurrentThreadId 30911->30912 30912->30913 30913->30891 30914->30908 30915->30908 30917 93750e7 30916->30917 30918 937641f GetCurrentThreadId 30917->30918 30919 93760f8 30917->30919 30918->30919 30919->30901 30948 937ae40 30949 937ae8e DrawTextExW 30948->30949 30951 937aee6 30949->30951 30952 966cc9d 30953 966cea2 30952->30953 30957 966f296 30953->30957 30975 966f298 30953->30975 30954 966ceb2 30958 966f298 30957->30958 30959 966f2d6 30958->30959 30993 e7a081f 30958->30993 30998 e7a0165 30958->30998 31005 e7a09e5 30958->31005 31009 e7a08e7 30958->31009 31013 e7a03a6 30958->31013 31018 e7a0262 30958->31018 31023 e7a038c 30958->31023 31028 e7a02cb 30958->31028 31033 e7a01d5 30958->31033 31038 e7a01b4 30958->31038 31043 e7a0354 30958->31043 31048 e7a0831 30958->31048 31053 e7a07b3 30958->31053 31058 e7a0233 30958->31058 31063 e7a057f 30958->31063 30959->30954 30976 966f2b2 30975->30976 30977 e7a081f 2 API calls 30976->30977 30978 e7a057f 2 API calls 30976->30978 30979 e7a0233 2 API calls 30976->30979 30980 e7a07b3 2 API calls 30976->30980 30981 e7a0831 2 API calls 30976->30981 30982 e7a0354 2 API calls 30976->30982 30983 e7a01b4 2 API calls 30976->30983 30984 e7a01d5 2 API calls 30976->30984 30985 e7a02cb 2 API calls 30976->30985 30986 e7a038c 2 API calls 30976->30986 30987 966f2d6 30976->30987 30988 e7a0262 2 API calls 30976->30988 30989 e7a03a6 2 API calls 30976->30989 30990 e7a08e7 2 API calls 30976->30990 30991 e7a09e5 2 API calls 30976->30991 30992 e7a0165 4 API calls 30976->30992 30977->30987 30978->30987 30979->30987 30980->30987 30981->30987 30982->30987 30983->30987 30984->30987 30985->30987 30986->30987 30987->30954 30988->30987 30989->30987 30990->30987 30991->30987 30992->30987 30994 e7a0a51 30993->30994 31068 966c451 30994->31068 31072 966c458 30994->31072 30995 e7a0a6c 30995->30959 31076 966c86c 30998->31076 31080 966c878 30998->31080 31007 966c451 Wow64SetThreadContext 31005->31007 31008 966c458 Wow64SetThreadContext 31005->31008 31006 e7a09ff 31007->31006 31008->31006 31084 966c6e0 31009->31084 31088 966c6d9 31009->31088 31010 e7a090d 31015 e7a03b3 31013->31015 31014 e7a07f5 31092 966c5f0 31015->31092 31096 966c5e8 31015->31096 31019 e7a01bd 31018->31019 31019->30959 31020 e7a05b8 31019->31020 31100 966c3a0 31019->31100 31104 966c3a8 31019->31104 31020->30959 31024 e7a02d8 31023->31024 31025 e7a090d 31024->31025 31026 966c6e0 ReadProcessMemory 31024->31026 31027 966c6d9 ReadProcessMemory 31024->31027 31026->31025 31027->31025 31029 e7a02d8 31028->31029 31030 e7a090d 31029->31030 31031 966c6e0 ReadProcessMemory 31029->31031 31032 966c6d9 ReadProcessMemory 31029->31032 31031->31030 31032->31030 31034 e7a04d4 31033->31034 31108 966c530 31034->31108 31112 966c528 31034->31112 31035 e7a04f2 31039 e7a01bd 31038->31039 31039->30959 31040 e7a05b8 31039->31040 31041 966c3a0 ResumeThread 31039->31041 31042 966c3a8 ResumeThread 31039->31042 31040->30959 31041->31039 31042->31039 31044 e7a04a8 31043->31044 31046 966c5f0 WriteProcessMemory 31044->31046 31047 966c5e8 WriteProcessMemory 31044->31047 31045 e7a098b 31046->31045 31047->31045 31049 e7a01bd 31048->31049 31049->30959 31049->31048 31050 e7a05b8 31049->31050 31051 966c3a0 ResumeThread 31049->31051 31052 966c3a8 ResumeThread 31049->31052 31050->30959 31051->31049 31052->31049 31054 e7a07b9 31053->31054 31056 966c5f0 WriteProcessMemory 31054->31056 31057 966c5e8 WriteProcessMemory 31054->31057 31055 e7a07f5 31056->31055 31057->31055 31059 e7a0256 31058->31059 31061 966c5f0 WriteProcessMemory 31059->31061 31062 966c5e8 WriteProcessMemory 31059->31062 31060 e7a05ed 31060->30959 31061->31060 31062->31060 31064 e7a01bd 31063->31064 31064->30959 31064->31063 31065 e7a05b8 31064->31065 31066 966c3a0 ResumeThread 31064->31066 31067 966c3a8 ResumeThread 31064->31067 31065->30959 31066->31064 31067->31064 31069 966c49d Wow64SetThreadContext 31068->31069 31071 966c4e5 31069->31071 31071->30995 31073 966c49d Wow64SetThreadContext 31072->31073 31075 966c4e5 31073->31075 31075->30995 31077 966c878 CreateProcessA 31076->31077 31079 966cac3 31077->31079 31079->31079 31081 966c901 CreateProcessA 31080->31081 31083 966cac3 31081->31083 31083->31083 31085 966c72b ReadProcessMemory 31084->31085 31087 966c76f 31085->31087 31087->31010 31089 966c72b ReadProcessMemory 31088->31089 31091 966c76f 31089->31091 31091->31010 31093 966c638 WriteProcessMemory 31092->31093 31095 966c68f 31093->31095 31095->31014 31097 966c5f0 WriteProcessMemory 31096->31097 31099 966c68f 31097->31099 31099->31014 31101 966c3a8 ResumeThread 31100->31101 31103 966c419 31101->31103 31103->31019 31105 966c3e8 ResumeThread 31104->31105 31107 966c419 31105->31107 31107->31019 31109 966c570 VirtualAllocEx 31108->31109 31111 966c5ad 31109->31111 31111->31035 31113 966c570 VirtualAllocEx 31112->31113 31115 966c5ad 31113->31115 31115->31035 30940 9375318 30941 937534e 30940->30941 30942 937540e 30941->30942 30944 937ea91 30941->30944 30945 937eae3 30944->30945 30946 937eb01 MonitorFromPoint 30945->30946 30947 937eb32 30945->30947 30946->30947 30947->30942
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (o^q$4'^q$4'^q$4'^q
                                                                                                    • API String ID: 0-183542557
                                                                                                    • Opcode ID: ecc6795c32bcae1dbf3d25bc0eb9cba79732e519ea5bc80b1ad567eb52e876d6
                                                                                                    • Instruction ID: 80ea0047ff1690a043051bf1d27a9d91555689ee135fa83ece724c3a6108bc27
                                                                                                    • Opcode Fuzzy Hash: ecc6795c32bcae1dbf3d25bc0eb9cba79732e519ea5bc80b1ad567eb52e876d6
                                                                                                    • Instruction Fuzzy Hash: C553D575A01219CFCB68DF68C888A9EF7B2BF49310F158599E459AB361CB34ED81CF50

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1064 93731d8-93731ff 1065 9373205 1064->1065 1066 937320a-937321f 1065->1066 1067 9373225 1066->1067 1068 937358c-9373593 1066->1068 1067->1065 1067->1068 1069 9373574-9373587 1067->1069 1070 93733d3-93733e9 1067->1070 1071 9373471-937347c 1067->1071 1072 93733bd-93733ce 1067->1072 1073 937355d-9373561 1067->1073 1074 937335d-9373383 1067->1074 1075 937333b-9373342 1067->1075 1076 9373398-93733a3 1067->1076 1077 9373318-937331f 1067->1077 1078 9373546-937354a 1067->1078 1079 9373443-9373451 1067->1079 1080 9373282-93732a3 1067->1080 1081 937322c-937323a 1067->1081 1082 93734aa-93734c0 1067->1082 1083 93732a8-93732be 1067->1083 1084 9373388-9373393 1067->1084 1085 93733a8-93733b8 1067->1085 1086 9373594-9373596 1068->1086 1069->1066 1089 9373597-9373601 1070->1089 1090 93733ef-93733f7 1070->1090 1097 937347e-9373481 1071->1097 1098 937348b-93734a5 1071->1098 1072->1066 1091 9373563-9373568 1073->1091 1092 937356a 1073->1092 1074->1066 1102 9373344-9373349 1075->1102 1103 937334b 1075->1103 1076->1066 1077->1089 1101 9373325-9373336 1077->1101 1087 9373553 1078->1087 1088 937354c-9373551 1078->1088 1095 9373456-937346c 1079->1095 1096 9373453 1079->1096 1080->1066 1093 9373241 1081->1093 1094 937323c-937323f 1081->1094 1082->1089 1100 93734c6-93734ce 1082->1100 1083->1089 1099 93732c4-93732cc 1083->1099 1084->1066 1085->1066 1105 9373558 1087->1105 1088->1105 1121 9373627-937362a 1089->1121 1122 9373603-9373605 1089->1122 1090->1089 1107 93733fd-937340d 1090->1107 1108 937356f 1091->1108 1092->1108 1109 9373243-9373280 1093->1109 1094->1109 1095->1066 1096->1095 1097->1098 1098->1066 1099->1089 1111 93732d2-93732df 1099->1111 1100->1089 1112 93734d4-93734e1 1100->1112 1101->1066 1106 9373350-9373358 1102->1106 1103->1106 1105->1066 1106->1066 1107->1089 1113 9373413-9373420 1107->1113 1108->1066 1109->1066 1111->1089 1117 93732e5-93732f5 1111->1117 1112->1089 1118 93734e7-93734f7 1112->1118 1113->1089 1119 9373426-937343e 1113->1119 1117->1089 1123 93732fb-9373313 1117->1123 1118->1089 1124 93734fd-9373517 1118->1124 1119->1066 1126 937362b-937364a 1121->1126 1125 9373607-9373609 1122->1125 1122->1126 1123->1066 1127 937351c-9373541 1124->1127 1128 9373519 1124->1128 1125->1086 1130 937360b-937360d 1125->1130 1131 9373653-9373657 1126->1131 1132 937364c 1126->1132 1127->1066 1128->1127 1133 937366e-9373688 1131->1133 1134 9373659-937365d 1131->1134 1132->1131 1146 9373693-9373697 1133->1146 1147 937368a 1133->1147 1137 9373663-937366b 1134->1137 1138 937392c-9373937 1134->1138 1137->1133 1148 937393e-93739a2 1138->1148 1149 93736a2-93736c6 1146->1149 1150 9373699-937369f 1146->1150 1147->1146 1170 93739a9-9373a0d 1148->1170 1157 9373861-937387b 1149->1157 1158 93736cc-93736de 1149->1158 1150->1149 1163 937391d-9373924 1157->1163 1158->1148 1164 93736e4-93736e8 1158->1164 1164->1148 1165 93736ee-93736f8 1164->1165 1169 93736fe-9373702 1165->1169 1165->1170 1169->1157 1172 9373708-937370c 1169->1172 1200 9373a14-9373a78 1170->1200 1174 937370e-9373715 1172->1174 1175 937371b-937371f 1172->1175 1174->1157 1174->1175 1176 9373725-9373735 1175->1176 1177 9373a7f-9373aad 1175->1177 1182 9373737-937373d 1176->1182 1183 9373765-937376b 1176->1183 1198 9373ab7-9373ab8 1177->1198 1199 9373aaf-9373ab3 1177->1199 1187 9373741-937374d 1182->1187 1188 937373f 1182->1188 1184 937376f-937377b 1183->1184 1185 937376d 1183->1185 1189 937377d-937379b 1184->1189 1185->1189 1191 937374f-937375f 1187->1191 1188->1191 1189->1157 1201 93737a1-93737a3 1189->1201 1191->1183 1191->1200 1199->1198 1202 9373ab5 1199->1202 1200->1177 1203 93737a5-93737b0 1201->1203 1204 93737be-93737c2 1201->1204 1202->1198 1233 93737b3 call 9373ac1 1203->1233 1234 93737b3 call 9373ad0 1203->1234 1235 93737b3 call 9373be8 1203->1235 1204->1157 1206 93737c8-93737d2 1204->1206 1206->1157 1213 93737d8-93737de 1206->1213 1208 93737b9 1208->1163 1214 9373927 1213->1214 1215 93737e4-93737e7 1213->1215 1214->1138 1215->1177 1217 93737ed-937380a 1215->1217 1223 937380c-9373827 1217->1223 1224 9373848-937385c 1217->1224 1230 937382f-9373843 1223->1230 1231 9373829-937382d 1223->1231 1224->1163 1230->1163 1231->1157 1231->1230 1233->1208 1234->1208 1235->1208
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (o^q$(o^q$,bq$,bq$Hbq
                                                                                                    • API String ID: 0-3486158592
                                                                                                    • Opcode ID: b43aecdd3aa48547b984603d93043398b634a97fb3dd9eb608945c7b33426294
                                                                                                    • Instruction ID: 80993e1cfcf0c91d1f152582dd48c0af9604079656ad6ba3bf3338ed686d8034
                                                                                                    • Opcode Fuzzy Hash: b43aecdd3aa48547b984603d93043398b634a97fb3dd9eb608945c7b33426294
                                                                                                    • Instruction Fuzzy Hash: D232B031A002188FCB24CF69E994A6EFBF6AF88350B14846AE456DB3A5CB34DC45DF51
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Te^q$Te^q
                                                                                                    • API String ID: 0-3743469327
                                                                                                    • Opcode ID: 6d0fad6ada25b8ab83532928d37ef568cb637ed40f1f1b5a064f2333dd0f4b4c
                                                                                                    • Instruction ID: e4f6eee68e8fa02f3f59d0d9c75b83105d66824e6a6041a58778c45e4c6e0be8
                                                                                                    • Opcode Fuzzy Hash: 6d0fad6ada25b8ab83532928d37ef568cb637ed40f1f1b5a064f2333dd0f4b4c
                                                                                                    • Instruction Fuzzy Hash: B451D175B102558FCB09CFA9C8947AEFBF2FF8A704F1444AAD445EB215CB309A02CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1804772952.000000000E7A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0E7A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e7a0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 84dbc2b98ce08bf690189e036c6156dd26580936ec6cd810f372da2b8b2aadd0
                                                                                                    • Instruction ID: 2599c272063d2b1d3256cbdf26344ea87556d1455feb98312611fcea3e52d215
                                                                                                    • Opcode Fuzzy Hash: 84dbc2b98ce08bf690189e036c6156dd26580936ec6cd810f372da2b8b2aadd0
                                                                                                    • Instruction Fuzzy Hash: 83E1FC317022448FEB2ADB69C520BAEB7FAAFC8700F18456CD2459B6A5DB34ED01CB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3ec3630275bf2e78dfa61d496e625d893806f7ffc987b33345b128b85ae2d271
                                                                                                    • Instruction ID: fdc73ced3bac5b79bcf6f0e4f56a66fa7f2da47259b569eff8d4ae7432903223
                                                                                                    • Opcode Fuzzy Hash: 3ec3630275bf2e78dfa61d496e625d893806f7ffc987b33345b128b85ae2d271
                                                                                                    • Instruction Fuzzy Hash: E07102B1624605CFC346CF68C880626B7B9FF49310B138456ED22DFA62C734EE62CB95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: faa8c50c3dea0bd2acd7d95963467abce7f5f1b44f39f03f8aa547e62783b289
                                                                                                    • Instruction ID: 545317a4b32ffc2172098a4a4ec33bd76a98442a2f84d95e36cddaa1f44ee0f9
                                                                                                    • Opcode Fuzzy Hash: faa8c50c3dea0bd2acd7d95963467abce7f5f1b44f39f03f8aa547e62783b289
                                                                                                    • Instruction Fuzzy Hash: A2413875E09248CBDB14CFA6D9647EDBBF9AF8E344F10E029D009A32A1DB345946CE41
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2c6c3bf54f9617a5c75016eb3b248cd00e808487e10631d5ba53b2f3ec191938
                                                                                                    • Instruction ID: 65f6cc7769f4bbf79988c5251fe47ed7479f06402a8010346dd9812d883aa7d4
                                                                                                    • Opcode Fuzzy Hash: 2c6c3bf54f9617a5c75016eb3b248cd00e808487e10631d5ba53b2f3ec191938
                                                                                                    • Instruction Fuzzy Hash: 5E212C32B142195BDB0DAA784A5923F69DFDBC8244F10883EE04BDB799CD78DE028791
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 77efd6c50efbf82a0a8188d3924a261d78ba45ec05a47942503855c13f53646c
                                                                                                    • Instruction ID: 35bcb4f5946be27fe4a9c8be7f0ff91726069e589adea69602b38bac1eb36954
                                                                                                    • Opcode Fuzzy Hash: 77efd6c50efbf82a0a8188d3924a261d78ba45ec05a47942503855c13f53646c
                                                                                                    • Instruction Fuzzy Hash: D421F4B0D046588BDB18CFA7C8147EEBFFAAF89344F04C0AAD419A6264DB750906CF91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0f2acfb32139a9f74a4a05ed76473593fc016ab7bbe1a6f85bc47a4fdb8c5997
                                                                                                    • Instruction ID: dc6ccd424c26af0c3824b5c1d50bdbff2d4a78781b5f195d3e5b636d9b9de68c
                                                                                                    • Opcode Fuzzy Hash: 0f2acfb32139a9f74a4a05ed76473593fc016ab7bbe1a6f85bc47a4fdb8c5997
                                                                                                    • Instruction Fuzzy Hash: 892108B0D046188BEB18CF9BD9447EEFAFBAFC8344F04C069D41976264DB740A468F90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1804772952.000000000E7A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0E7A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e7a0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5c15271a38db761733349107c7f60c6a2c8d5e26f00d727aae28669508d420b1
                                                                                                    • Instruction ID: 9a2b91ba166f989fe0b86c1e5095922a7bbdab46e0af0409804c9416314f2f1c
                                                                                                    • Opcode Fuzzy Hash: 5c15271a38db761733349107c7f60c6a2c8d5e26f00d727aae28669508d420b1
                                                                                                    • Instruction Fuzzy Hash: 04A001049CF005C0C0005C164E311F8C02C528F648FCC7F04531E262B208D0D840120D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1645 937ea91-937eaec 1647 937eb52-937eb6d 1645->1647 1648 937eaee-937eb30 MonitorFromPoint 1645->1648 1656 937eb6f-937eb7c 1647->1656 1651 937eb32-937eb38 1648->1651 1652 937eb39-937eb47 call 937ec68 1648->1652 1651->1652 1655 937eb4d-937eb50 1652->1655 1655->1656
                                                                                                    APIs
                                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 0937EB1F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FromMonitorPoint
                                                                                                    • String ID: pi
                                                                                                    • API String ID: 1566494148-451671704
                                                                                                    • Opcode ID: 8fbad5809feedb3b5e8405a2ee8167e431c648989eb043f8f13be74d1f162f2a
                                                                                                    • Instruction ID: 94dd674a2a25aa2a080a33c52c8a35090b4e50e62bf3e3f7312aff47f4613e59
                                                                                                    • Opcode Fuzzy Hash: 8fbad5809feedb3b5e8405a2ee8167e431c648989eb043f8f13be74d1f162f2a
                                                                                                    • Instruction Fuzzy Hash: 782187759043489FCB24DFA9D445BEEBFF5EF88310F10805AE856AB291C738A944CFA1
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0966CAAE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: 1a1e4f9c0381ff23e2700a2ea7d87127b90dbd5b2aa7eee9bb9c916e2373a7a2
                                                                                                    • Instruction ID: 80ded0ab9a31b2c2dbb5d00da269b5a76396b43fb89afb1add2cd890b2ba5403
                                                                                                    • Opcode Fuzzy Hash: 1a1e4f9c0381ff23e2700a2ea7d87127b90dbd5b2aa7eee9bb9c916e2373a7a2
                                                                                                    • Instruction Fuzzy Hash: DAA18C71D006199FDB20CF68C841BEDBBB2BF49314F1481AAE999E7250DB789981CF91
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0966CAAE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: f26853125c098d9626cd4ebd15a317206c85c2af5ebd47db64209a70a100f6a0
                                                                                                    • Instruction ID: e7f54cbf328fb3cc7a78c65d2d614f56c5a2431c2030c9e123fafa8e4dc73e3c
                                                                                                    • Opcode Fuzzy Hash: f26853125c098d9626cd4ebd15a317206c85c2af5ebd47db64209a70a100f6a0
                                                                                                    • Instruction Fuzzy Hash: FC918C71D006199FDB20CF68C840BEDBBB2BF49314F1481AAE998E7350DB789985CF91
                                                                                                    APIs
                                                                                                    • CreateActCtxA.KERNEL32(?), ref: 02338FA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: f4f9136a29e2d38b31bdfb8c23f7dddc99d158431c9afe9cb57e491a38ebabf7
                                                                                                    • Instruction ID: 38e213a511443dee5f56dd5c9fbbfe6256b4697dde7f596aad74f7966ac9da63
                                                                                                    • Opcode Fuzzy Hash: f4f9136a29e2d38b31bdfb8c23f7dddc99d158431c9afe9cb57e491a38ebabf7
                                                                                                    • Instruction Fuzzy Hash: 214104B0C00619CFDB25CFA9C9447DDBBB5FF48304F2480AAD448AB255DB75698ACF90
                                                                                                    APIs
                                                                                                    • CreateActCtxA.KERNEL32(?), ref: 02338FA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: d988fba8ec59130b694faf27c81c255073e30b8e037125eec2c26fb54780488a
                                                                                                    • Instruction ID: e41c2b30dd02a8d857c14f6540e2e7038cd167058a07b9f393ab5294eb489d71
                                                                                                    • Opcode Fuzzy Hash: d988fba8ec59130b694faf27c81c255073e30b8e037125eec2c26fb54780488a
                                                                                                    • Instruction Fuzzy Hash: EA41D1B0C00719CBDB25CFA9C944BDEBBF5BF48304F20806AD448AB255DBB56985CF91
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0966C680
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: e7e657bd1f0378133a65fede476b39543643e40f0642d57ea5489dcd0b86fdca
                                                                                                    • Instruction ID: 3dfb626ec744174f881654590799a97071837491716b26d54656c816ca9a0d79
                                                                                                    • Opcode Fuzzy Hash: e7e657bd1f0378133a65fede476b39543643e40f0642d57ea5489dcd0b86fdca
                                                                                                    • Instruction Fuzzy Hash: 732157B1900309DFCB10DFA9C885BDEBBF4FF48310F108429E598A7250D7789944CBA4
                                                                                                    APIs
                                                                                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0937AED7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DrawText
                                                                                                    • String ID:
                                                                                                    • API String ID: 2175133113-0
                                                                                                    • Opcode ID: 3c4107be7dd34c7677b4a8160beecc67cdea8d34c8b034181b3d8e0abfe4a938
                                                                                                    • Instruction ID: 5ff6ac2cbe5e1080e111bcea8fc2c1d7ff92a13772fa3d1cb86d8b4c12eceb3a
                                                                                                    • Opcode Fuzzy Hash: 3c4107be7dd34c7677b4a8160beecc67cdea8d34c8b034181b3d8e0abfe4a938
                                                                                                    • Instruction Fuzzy Hash: 8031C2B59003499FDB10CF9AD884AEEFBF5EF48320F14842AE559A7610D775A944CFA0
                                                                                                    APIs
                                                                                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0937AED7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DrawText
                                                                                                    • String ID:
                                                                                                    • API String ID: 2175133113-0
                                                                                                    • Opcode ID: 57c8dead19391f75f290b697987044e69ea5d158462c5333a0131568457da1c0
                                                                                                    • Instruction ID: 3060c0b7338b7bf94f5487ceaefa5b7ed04bb063ec3ed249a1e93cf5d82c57e2
                                                                                                    • Opcode Fuzzy Hash: 57c8dead19391f75f290b697987044e69ea5d158462c5333a0131568457da1c0
                                                                                                    • Instruction Fuzzy Hash: 9A21CEB59003099FDB10CF9AD884AEEFBF5FB48320F14842AE919A7610D774A944CFA0
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0966C680
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: dcc7dbb7714d580fa43713feef9a29d19b06c8826ae5fa08abbd9d2370272dd4
                                                                                                    • Instruction ID: 2862fcbfb4e78de6cbbaa3d168786492551bc44b4f45a06ea5db7ea5a9ea7075
                                                                                                    • Opcode Fuzzy Hash: dcc7dbb7714d580fa43713feef9a29d19b06c8826ae5fa08abbd9d2370272dd4
                                                                                                    • Instruction Fuzzy Hash: 762125B19003599FCB10CFA9C985BDEBBF5FF48310F10842AE998A7250C7789954CBA4
                                                                                                    APIs
                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0966C4D6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThreadWow64
                                                                                                    • String ID:
                                                                                                    • API String ID: 983334009-0
                                                                                                    • Opcode ID: e6ffe77a7516882357c3a616b354b7d3645700abb678e32d1bf3cda8a742c34d
                                                                                                    • Instruction ID: b9a8e077949f4aa344c167137f3bdc8efdfdf188bf709b39ec23d9c30a742340
                                                                                                    • Opcode Fuzzy Hash: e6ffe77a7516882357c3a616b354b7d3645700abb678e32d1bf3cda8a742c34d
                                                                                                    • Instruction Fuzzy Hash: D82139719006098FDB14DFAAC5857EEBBF4EF48314F10C42AD559A7351CB789944CFA4
                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0966C760
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 8d1fd14e1aa956c10e4809a59e03941bf559a0eb907422dafcd865c99628d9e2
                                                                                                    • Instruction ID: 6fcb6cc2e3c2895f628009ae727e7d8370f1f3be2a19e6aba0468d991421f0c8
                                                                                                    • Opcode Fuzzy Hash: 8d1fd14e1aa956c10e4809a59e03941bf559a0eb907422dafcd865c99628d9e2
                                                                                                    • Instruction Fuzzy Hash: A92128B1C007599FCB10DFAAC885ADEFBF5FF48320F10842AE559A7250C7789954CBA4
                                                                                                    APIs
                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0966C4D6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThreadWow64
                                                                                                    • String ID:
                                                                                                    • API String ID: 983334009-0
                                                                                                    • Opcode ID: 9c5f35acb888afd7fbc735c29625a74889f08469d0e91855234abf8f4d2860b7
                                                                                                    • Instruction ID: e24e4f797615974d7c912ecf1a6af73ad70d80567e69e47ad65a9a26af424bfd
                                                                                                    • Opcode Fuzzy Hash: 9c5f35acb888afd7fbc735c29625a74889f08469d0e91855234abf8f4d2860b7
                                                                                                    • Instruction Fuzzy Hash: 862138B19002098FDB10DFAAC4857EEBBF4EF48324F10842AD599A7350CB78A944CFA4
                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0966C760
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 38a3771dd1cf37134b3d0212a0da0d547ebb59942899a986d0fe4dbd02e20a6e
                                                                                                    • Instruction ID: f0938d015fb663ca876fafb44c822bb0810f42fa39fa61b8308995dd5a80e4fc
                                                                                                    • Opcode Fuzzy Hash: 38a3771dd1cf37134b3d0212a0da0d547ebb59942899a986d0fe4dbd02e20a6e
                                                                                                    • Instruction Fuzzy Hash: 6E2139B1C003599FCB10DFAAC884ADEFBF5FF48310F108429E558A7250C7389544CBA4
                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0966C59E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 27dadd2720eb2f901fa3af2fd55630a3d72ea1b5ce127211945d3481533c1277
                                                                                                    • Instruction ID: 9b19f800bcae67c246c1e8a4f98ef928681cbcbe03610d6a939190c80a000169
                                                                                                    • Opcode Fuzzy Hash: 27dadd2720eb2f901fa3af2fd55630a3d72ea1b5ce127211945d3481533c1277
                                                                                                    • Instruction Fuzzy Hash: 96215976900249DFCB24CFA9C845BEEBFF5EF88324F20842AE555A7260C7399554CFA0
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: dfcb1f0f78c5d12a2bddc0d2d2eb04ea1801fdef7de0d35c6d46cdb4a326de95
                                                                                                    • Instruction ID: 8b5ffc8aab8d0d141f6e6adb9203cf12794da486e6e7ad481fd71792953b093f
                                                                                                    • Opcode Fuzzy Hash: dfcb1f0f78c5d12a2bddc0d2d2eb04ea1801fdef7de0d35c6d46cdb4a326de95
                                                                                                    • Instruction Fuzzy Hash: E71179B1900748CBCB20DFAAC4457EEFBF4EB88324F208829D559A7250C738A840CFA5
                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0966C59E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: d02e5b6d2e8370e49a9fbb9d24449af612a9cbf5f2e1060568bf586d517aac91
                                                                                                    • Instruction ID: ae5b02ae16b9418504b7af18a66f7a531d2e0c68c00b7917962f601be22bdc81
                                                                                                    • Opcode Fuzzy Hash: d02e5b6d2e8370e49a9fbb9d24449af612a9cbf5f2e1060568bf586d517aac91
                                                                                                    • Instruction Fuzzy Hash: 561137719002499FCB20DFAAC844BDEBFF5EF88324F20841AE559A7260C775A554CFA4
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 438e20e66771da8b4cb0a69db92ac17731cabec075095ce930b527d058322f1c
                                                                                                    • Instruction ID: 547e4e10af62c1a78f0240a229781561064557078abd3c52f24372f141e517c3
                                                                                                    • Opcode Fuzzy Hash: 438e20e66771da8b4cb0a69db92ac17731cabec075095ce930b527d058322f1c
                                                                                                    • Instruction Fuzzy Hash: 181136B19002488FDB20DFAAC4457EEFBF5EF88324F208429D559A7250CB79A944CFA5
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0233E5C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 4139908857-0
                                                                                                    • Opcode ID: fa5d7068cd45ef32ac67d16b228618ed0609ac69715011b5498589a63aa2a1e5
                                                                                                    • Instruction ID: e7a7b7f7c1232a44b7b8011205382e6d1f2a4cf39c9280fdb3f647d0f642c228
                                                                                                    • Opcode Fuzzy Hash: fa5d7068cd45ef32ac67d16b228618ed0609ac69715011b5498589a63aa2a1e5
                                                                                                    • Instruction Fuzzy Hash: 561110B6C002498FDB10CF9AC444ADEFBF4EF88324F10846AD468B7210D375A645CFA1
                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 0E7A1215
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1804772952.000000000E7A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0E7A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e7a0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 6cff6043aad839dc409615a57595c7dacf870931e3ef10f4bdd4b3e9edc16276
                                                                                                    • Instruction ID: f37238886cd561511c4ac4851b208a42dd0ca3d29ed329aacfb96f80ae5c0054
                                                                                                    • Opcode Fuzzy Hash: 6cff6043aad839dc409615a57595c7dacf870931e3ef10f4bdd4b3e9edc16276
                                                                                                    • Instruction Fuzzy Hash: A31103B5800348DFDB10DF9AD845BDEBBF8FB48324F20845AE558A7250D375A944CFA5
                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 0E7A1215
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1804772952.000000000E7A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0E7A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e7a0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 0eacc70497b427d1ac54af8f646f7f73efd29e557b56d758adafb130483c6326
                                                                                                    • Instruction ID: b3a29f705399cc301a87f5c935234c3b806177f9dbf196a2944f803c56e3c19e
                                                                                                    • Opcode Fuzzy Hash: 0eacc70497b427d1ac54af8f646f7f73efd29e557b56d758adafb130483c6326
                                                                                                    • Instruction Fuzzy Hash: 601103B58003489FDB10DF9AC844BDEBBF8EB48320F108459D558A7250C375A944CFA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790051286.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a4d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c9b4d0fcf00ecd5da7eb57ff706d34bd7295b9bc9c7b8e60e7f8b968690f3975
                                                                                                    • Instruction ID: 7818775bbe1259fc9fb875e126f525ffa561f6a0b17aa5c4ec787aab247eabe5
                                                                                                    • Opcode Fuzzy Hash: c9b4d0fcf00ecd5da7eb57ff706d34bd7295b9bc9c7b8e60e7f8b968690f3975
                                                                                                    • Instruction Fuzzy Hash: 1F212279600240EFCB05DF14D9C0B2ABF75FBD8318F20C669E9094B256C736D856CAA2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790086437.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a5d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2fccd532b1a4df3bbd0d338044d2f3c79a33376bd65fa99f27ae149533e1d3eb
                                                                                                    • Instruction ID: 23c3b9683e145bf9ba8f958a5ca7c7331a5a3f26708de26e666f23ce2599fe5c
                                                                                                    • Opcode Fuzzy Hash: 2fccd532b1a4df3bbd0d338044d2f3c79a33376bd65fa99f27ae149533e1d3eb
                                                                                                    • Instruction Fuzzy Hash: 60210471504200EFDB25DF14D9C0B6ABBA5FB94315F20C66DEC094F296C376D84ACA61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790086437.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a5d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 83b09fc1fb5a6329ddb2ff87a601da4467ab0850adc47de665bc93c1dfd39812
                                                                                                    • Instruction ID: 020f7cf1f47f6aa603eb309c8513cc1805744686629c0a8be2520b05336fa88b
                                                                                                    • Opcode Fuzzy Hash: 83b09fc1fb5a6329ddb2ff87a601da4467ab0850adc47de665bc93c1dfd39812
                                                                                                    • Instruction Fuzzy Hash: A921F271604200DFDB24DF14D9C4B26BFA5FB84315F20C569DC0A4B296C33AD84BCA61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790086437.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a5d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4195e0cba8c41e714700f05f623120e5f34804ccc855c88902452412edd767e6
                                                                                                    • Instruction ID: 4e175e546a77385e466f072b887381eb1a060e9efc5fbb9936eda9187e1756a8
                                                                                                    • Opcode Fuzzy Hash: 4195e0cba8c41e714700f05f623120e5f34804ccc855c88902452412edd767e6
                                                                                                    • Instruction Fuzzy Hash: A72162755093808FDB16CF24D994715BF71FB46314F28C5DAD8498B6A7C33A980ACB62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790051286.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a4d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                    • Instruction ID: 8f0a0d0e40f41c100cf43f3e30d81de8cff070b6269a82bc22eced743a225701
                                                                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                    • Instruction Fuzzy Hash: DB11D376504280CFCB16CF14D5C4B16BF71FB94318F24C6A9D8494B656C336D85ACBA2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790086437.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a5d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                    • Instruction ID: a20ebfd68490568579c7b36fabef9317655208f4222cd8fcfa133738c98c8ac7
                                                                                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                    • Instruction Fuzzy Hash: 49118B75504280DFDB16CF14D5C4B59BBA1FB84314F24C6AEDC494B696C33AD84ACB61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790051286.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a4d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4e33eb9480b59c685fcf7f0ef1f54048a11751b89cd21cc456047f940756008a
                                                                                                    • Instruction ID: 1afeaf76bfae1e7632582559ffb0f7b267fbe9114dc5be0776bd305d93e16109
                                                                                                    • Opcode Fuzzy Hash: 4e33eb9480b59c685fcf7f0ef1f54048a11751b89cd21cc456047f940756008a
                                                                                                    • Instruction Fuzzy Hash: 2401D6750083409AE7109F29CD88B67BFACEFC1324F18C56AED094E296D679D841CBB1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790051286.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a4d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f4e6530b0905ffa05d04cf40e583216878465528d9d2ecbae83c8349bd9181b2
                                                                                                    • Instruction ID: 0305870288cffed57c315579f18d2689b2b7187979f1be81b4ade7818f1d19fb
                                                                                                    • Opcode Fuzzy Hash: f4e6530b0905ffa05d04cf40e583216878465528d9d2ecbae83c8349bd9181b2
                                                                                                    • Instruction Fuzzy Hash: 44F06D75408344AAEB108F1ACC88B62FFA8EF91735F18C45AED084E296C6799844CBB1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 4'^q$TJcq$Te^q$pbq$xbaq
                                                                                                    • API String ID: 0-2576840827
                                                                                                    • Opcode ID: 5ac3498a3d5721bad2f5c65fb1fb9eed82b041561deb5a80670ece1444333cc5
                                                                                                    • Instruction ID: 15140ba42bca5112535e4569da306f9b530bdb2b61b2ae0a12855448a5dec3c9
                                                                                                    • Opcode Fuzzy Hash: 5ac3498a3d5721bad2f5c65fb1fb9eed82b041561deb5a80670ece1444333cc5
                                                                                                    • Instruction Fuzzy Hash: BAB2A475A00628DFDB64CF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81CF40
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: TJcq$Te^q$xbaq
                                                                                                    • API String ID: 0-3225726259
                                                                                                    • Opcode ID: 459e0b54ca97e24fd79ab2dcb829a5898f6762947f8286adf0a6430aa8c1ed56
                                                                                                    • Instruction ID: 2de0569fe7a8692556adc0a26101cc008a8f3933505446f20e68287ec053fff4
                                                                                                    • Opcode Fuzzy Hash: 459e0b54ca97e24fd79ab2dcb829a5898f6762947f8286adf0a6430aa8c1ed56
                                                                                                    • Instruction Fuzzy Hash: E3C17475E016588FDB69CF6AC944AD9BBF2BF89300F14C1EAD409AB325DB305A85CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: |6d
                                                                                                    • API String ID: 0-1476808477
                                                                                                    • Opcode ID: 5fb0a3e629579c278929887b3621ef0c4422855ff9ff930477f8cd2daf2be3c8
                                                                                                    • Instruction ID: 3c0908ea3369f7ad595cf9fb27447cfd733b02a5951fe1281322f089d0cc20cc
                                                                                                    • Opcode Fuzzy Hash: 5fb0a3e629579c278929887b3621ef0c4422855ff9ff930477f8cd2daf2be3c8
                                                                                                    • Instruction Fuzzy Hash: B4E1D774E001598FCB14DFA9C5849AEFBB2FF89304F248169E415AB35AD731AD42CFA1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: @8d
                                                                                                    • API String ID: 0-3898942734
                                                                                                    • Opcode ID: e186ad89bca240d9f869ce71d8c977b722f255fba72d99a9e018c074bca1cbaf
                                                                                                    • Instruction ID: c00ab5605301d7df65dd0625eb177e0450447d0ddb99d8b718298bb2ee95248b
                                                                                                    • Opcode Fuzzy Hash: e186ad89bca240d9f869ce71d8c977b722f255fba72d99a9e018c074bca1cbaf
                                                                                                    • Instruction Fuzzy Hash: C8E1DA74E101198FCB14DFA9C5849AEFBB2FF89304F248169E415AB35AD731AD42CFA1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 0p
                                                                                                    • API String ID: 0-1471970917
                                                                                                    • Opcode ID: d8255ddec58ceac5021f0364b59c192116265f665cdfc6981a816b2dfca51c5e
                                                                                                    • Instruction ID: 7d7dfeb7520b0ace97abe25651852ec1beef476fc8b1924f2133e54afb348604
                                                                                                    • Opcode Fuzzy Hash: d8255ddec58ceac5021f0364b59c192116265f665cdfc6981a816b2dfca51c5e
                                                                                                    • Instruction Fuzzy Hash: 9C6158316142458FC726CF39C880A5B7FF6FF85300B44C8AAE99ACB666D630EE51CB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 77a19262e5d01a051fd33717893c78984f410d2650671cad54ac9496359c0017
                                                                                                    • Instruction ID: ab2a03e8d36690b16ff9f51947dbe743e8febe6b56b999e5d68bb01b05da6e0c
                                                                                                    • Opcode Fuzzy Hash: 77a19262e5d01a051fd33717893c78984f410d2650671cad54ac9496359c0017
                                                                                                    • Instruction Fuzzy Hash: 46E1DC74E041198FCB14DFA9C5849AEFBB2FF49304F248169E819AB35AD731AD41CF61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a17137bfba359f03ba88327d0003ba2eae621cef65ee5748299228df3a835b70
                                                                                                    • Instruction ID: fad486b6610e3a5bba1a977dae44e719c3735ccee2f324ddd0d40333304589f1
                                                                                                    • Opcode Fuzzy Hash: a17137bfba359f03ba88327d0003ba2eae621cef65ee5748299228df3a835b70
                                                                                                    • Instruction Fuzzy Hash: 5AE1E974E041198FDB14DFA9C584AAEBBB2FF89304F248169E415EB35AD731AD42CF60
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 370da0682802948e0d8c8ff5179ea414d6b52296d14e3eae4b8d32c00bd47ce1
                                                                                                    • Instruction ID: 243750b5e1f4b4388a87a56f9ecaa33a4d9df25d9779e0f4970af7d8392cf6cc
                                                                                                    • Opcode Fuzzy Hash: 370da0682802948e0d8c8ff5179ea414d6b52296d14e3eae4b8d32c00bd47ce1
                                                                                                    • Instruction Fuzzy Hash: 58E1C774E14119CFCB14DFA9C580AAEBBB2FF89304F248169E415AB35ADB31AD41CF61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ac2013adbae333e59e8abec23060b4842ea8fc7e102e7b974b5feef5dc75a960
                                                                                                    • Instruction ID: 2624a77fdba7116a15d009325658a9fdc10f1c2cde10164bb1c2821fa725ee17
                                                                                                    • Opcode Fuzzy Hash: ac2013adbae333e59e8abec23060b4842ea8fc7e102e7b974b5feef5dc75a960
                                                                                                    • Instruction Fuzzy Hash: F8A10531B043018FCB39DF28D494A6AFBA2AF85300B158469E415DB765CB39EC81CFA2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1802026159.0000000009370000.00000040.00000800.00020000.00000000.sdmp, Offset: 09370000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9370000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3995c13b26222af5404e15a4f8e29aad10ce5c6a197f9521bd7c2ac0db023884
                                                                                                    • Instruction ID: 2e6e98d53f1bb9263e05011837a3459f98993f3ad6303e440d3414e931b3c87f
                                                                                                    • Opcode Fuzzy Hash: 3995c13b26222af5404e15a4f8e29aad10ce5c6a197f9521bd7c2ac0db023884
                                                                                                    • Instruction Fuzzy Hash: 7BA11231B142188BCB65CB28D58197EFBF6EFC9350B18C82AE066DB664C638ED45DF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e212c441868d5766004e9998cce9acc56658225f45d2c9966768c428875eb708
                                                                                                    • Instruction ID: b97627c958eac9ebff4654c1e1e841b48b61b4ff78bc97d5119531e47402be10
                                                                                                    • Opcode Fuzzy Hash: e212c441868d5766004e9998cce9acc56658225f45d2c9966768c428875eb708
                                                                                                    • Instruction Fuzzy Hash: 46A1D374D05218CFDB18CFA6C8547EDBBF6BF8A340F1091AAD419A7261DB745986CF40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e1f4e4093c928a626539786d463f0cbfec311bc85a7a3c11969a03b80c2ea196
                                                                                                    • Instruction ID: 2ed07cedcfb6b0395f275f39a0a02ea51997908bb0e43b63d44e615257e84bec
                                                                                                    • Opcode Fuzzy Hash: e1f4e4093c928a626539786d463f0cbfec311bc85a7a3c11969a03b80c2ea196
                                                                                                    • Instruction Fuzzy Hash: 8CA1E274D09228CFDB18CFA6C8547EDBBF6BF8A340F10916AD419A7261DB745A86CF40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1803489394.0000000009660000.00000040.00000800.00020000.00000000.sdmp, Offset: 09660000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_9660000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 03a3ae957a0cffb3df5a02e504cc1d47e354c0a75d90efaf9e9f1829eec35419
                                                                                                    • Instruction ID: e6e13d66649c82102e631b699651adb063a1b358b6598379010082fd0982498c
                                                                                                    • Opcode Fuzzy Hash: 03a3ae957a0cffb3df5a02e504cc1d47e354c0a75d90efaf9e9f1829eec35419
                                                                                                    • Instruction Fuzzy Hash: F251EAB5E002198BDB14DFA9C5845AEFBB2FF89304F24C169D418A7356D731AA42CFA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dfe8cc356474d7e60016c929dc50d1ee14be1e2286553465c6222ed3f9d66556
                                                                                                    • Instruction ID: 7a5932b035782fc810e51d12ea7e5953a77d3888afc60332157f31396ce83571
                                                                                                    • Opcode Fuzzy Hash: dfe8cc356474d7e60016c929dc50d1ee14be1e2286553465c6222ed3f9d66556
                                                                                                    • Instruction Fuzzy Hash: B731D6B5F1810A8FCB45CF69C8C556EFBF5AB84200F16C16AE506E7752D234CA40CBD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1790349191.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2330000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c8c8966931caddb8cb0126d021a8806c5d45ad01fc3c45847a7a3a209e8bd617
                                                                                                    • Instruction ID: 553e56073413271155f6085acbdc1d7c88e1826d941381d9116373ec53d21614
                                                                                                    • Opcode Fuzzy Hash: c8c8966931caddb8cb0126d021a8806c5d45ad01fc3c45847a7a3a209e8bd617
                                                                                                    • Instruction Fuzzy Hash: 6031C6B5F1420ACFCB45CF69C88556EFBB5EB88200F12D16AE906EB752D235DA40CBD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e4ee3b7d72514f7df545616ea595b6fb2564ab71d8e130c0ebb02b61d17398cd
                                                                                                    • Instruction ID: b06ae970e4223585f5d9ee02148110a46a094d9a76f70acddfa181d42e22d096
                                                                                                    • Opcode Fuzzy Hash: e4ee3b7d72514f7df545616ea595b6fb2564ab71d8e130c0ebb02b61d17398cd
                                                                                                    • Instruction Fuzzy Hash: A353F831C10B1A8ACB55EF68C8805A9F7B1FF99300F15D79AE45977221FB70AAD4CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b0f69aca6e4c214a87504789fda1e1402f8544bc2325a374660c10a00cc760db
                                                                                                    • Instruction ID: 70dd6b51ae241f7985a23bd8fa63fb67a4512d5bb337bc7953bba7481a8d4e09
                                                                                                    • Opcode Fuzzy Hash: b0f69aca6e4c214a87504789fda1e1402f8544bc2325a374660c10a00cc760db
                                                                                                    • Instruction Fuzzy Hash: 11334031D107198ECB15DF68C8906ADF7B1FF99300F15C79AE459AB211EB70AAC5CB81
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm
                                                                                                    • API String ID: 0-2312107965
                                                                                                    • Opcode ID: 16dc85aad3e740778038d2f613b462c9d68fe6cab9a45b966e94b4e08cc3db75
                                                                                                    • Instruction ID: 5816596d525603c08bb8f77a1fe78965e15a6bbb8727c88b14930f1f1d6809c2
                                                                                                    • Opcode Fuzzy Hash: 16dc85aad3e740778038d2f613b462c9d68fe6cab9a45b966e94b4e08cc3db75
                                                                                                    • Instruction Fuzzy Hash: AC915EB0E10209CFDF18CFA9D9957DEBBF2BF88314F148129E415A7654EB749845CB82
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 303161e5cc0acd2e663757ad2f86d2ce0d7ac83f2171b69ea15bc76e3a319429
                                                                                                    • Instruction ID: 53f1340e76f803b979e391e103317b3817aebd5f21c66297e069d2b1d9cf3370
                                                                                                    • Opcode Fuzzy Hash: 303161e5cc0acd2e663757ad2f86d2ce0d7ac83f2171b69ea15bc76e3a319429
                                                                                                    • Instruction Fuzzy Hash: D0B18070E006098FDF18CFA8C8917EDBBF2BF98314F148129D859E7A94EB749845CB81
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm$\VXm
                                                                                                    • API String ID: 0-3652994748
                                                                                                    • Opcode ID: 81773d02059612fcd03ab709eaf8c297e97acaddb35ef03965410627051ee70b
                                                                                                    • Instruction ID: c0c91a1d3dc4fda4a1ff7c681e32a5879a228d9aff4ebef0469250cc6dcdd6a9
                                                                                                    • Opcode Fuzzy Hash: 81773d02059612fcd03ab709eaf8c297e97acaddb35ef03965410627051ee70b
                                                                                                    • Instruction Fuzzy Hash: B7716CB0D00249CFDF18CFA9C9857DDBBF1AF48314F148129E419ABA54EB749846CF96
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm$\VXm
                                                                                                    • API String ID: 0-3652994748
                                                                                                    • Opcode ID: 1ecc90df2b1240f7129eb561cc3a8bb15ab4fd7e654e72aa81f8c190646a55f8
                                                                                                    • Instruction ID: 151976b2b1fb1a9d1e6750aa0cf489db7ef3093029fcdea40a91643c4f7eeca1
                                                                                                    • Opcode Fuzzy Hash: 1ecc90df2b1240f7129eb561cc3a8bb15ab4fd7e654e72aa81f8c190646a55f8
                                                                                                    • Instruction Fuzzy Hash: C8714FB0E00249CFDF18CFA9C98579DBBF2EF48314F148129E419A7A54EB749845CB96
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q$LR^q
                                                                                                    • API String ID: 0-4089051495
                                                                                                    • Opcode ID: 67450a961be8f17eccda1dbaf95e0543347c8018354f25a6bc8511bc7d8ec9bc
                                                                                                    • Instruction ID: dc996811cdc38b80eba196133f989c85b6b0403e76f267309e3dbd16ba25a427
                                                                                                    • Opcode Fuzzy Hash: 67450a961be8f17eccda1dbaf95e0543347c8018354f25a6bc8511bc7d8ec9bc
                                                                                                    • Instruction Fuzzy Hash: 6851D230B002158FDB1ADF78D8507AEB7B1FF86314F10852AE415EB281DB759C46CB92
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm
                                                                                                    • API String ID: 0-2312107965
                                                                                                    • Opcode ID: ac933cf79a8d786fe7ec07691d3ec6182ece9cb92168711fc0aff324d25fa5e4
                                                                                                    • Instruction ID: 959d7caca844d46600ba92bcb33bfb2bcc0c721d7620388b89da6f449bfe3a41
                                                                                                    • Opcode Fuzzy Hash: ac933cf79a8d786fe7ec07691d3ec6182ece9cb92168711fc0aff324d25fa5e4
                                                                                                    • Instruction Fuzzy Hash: C7A15BB0E10209CFDF18CFA8D9857DEBBF1BF48314F148129E459A7654EB749886CB82
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q
                                                                                                    • API String ID: 0-2549759414
                                                                                                    • Opcode ID: 8ebb988dc3953951157819a45531f84fce8cbf2ac9321291287ecf8dea274b2d
                                                                                                    • Instruction ID: 642a7da3f1c8bc877d28063c6f0d870ddd46769e0abec8d3ade8221877556537
                                                                                                    • Opcode Fuzzy Hash: 8ebb988dc3953951157819a45531f84fce8cbf2ac9321291287ecf8dea274b2d
                                                                                                    • Instruction Fuzzy Hash: FE41FF30B042029FCB1AAB38C5546AE7BE2ABC8210F144478D006DB395EF79DE87CB91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q
                                                                                                    • API String ID: 0-2625958711
                                                                                                    • Opcode ID: d94e83927091140f65638cc10a71c676fa9d38262e27928ab517df3597e79b66
                                                                                                    • Instruction ID: 2b5285a2b01e10bbbcccb7e91fa2ff2c380a667c3d294ff7f6fd0c27253daa2b
                                                                                                    • Opcode Fuzzy Hash: d94e83927091140f65638cc10a71c676fa9d38262e27928ab517df3597e79b66
                                                                                                    • Instruction Fuzzy Hash: 3331B335E102198BDF19DFA9D45079EB7B1FF8A304F108525E815FB280EB71A846CB81
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q
                                                                                                    • API String ID: 0-2625958711
                                                                                                    • Opcode ID: e2660f2edcd0bf0c5cb61991b5ddaeca650eb31604fb9e0a36aced2da27d453d
                                                                                                    • Instruction ID: 410fd3beabb958fd28b6df887dfe032793227ba5708b0406175963786acc5a86
                                                                                                    • Opcode Fuzzy Hash: e2660f2edcd0bf0c5cb61991b5ddaeca650eb31604fb9e0a36aced2da27d453d
                                                                                                    • Instruction Fuzzy Hash: C821F5316143415FC30AEB3D90602AEBBB1FF86314B1045AFC049CB396DB798C46C792
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 73c5b05df52c6c3e25a2bd038f651a14061380cf868675d05e19438c7c357663
                                                                                                    • Instruction ID: 91767202c4da650f87adba5146f5d29a44d7312ac84e96b035897ec885012815
                                                                                                    • Opcode Fuzzy Hash: 73c5b05df52c6c3e25a2bd038f651a14061380cf868675d05e19438c7c357663
                                                                                                    • Instruction Fuzzy Hash: 591260317102069FCB5EAB3CE4956AC7AA6FB8A244F50893AE005CF356DF71DC46DB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dd38a8a86a9becd21e6a24dafbcc60e7c79994490d53087dfe731d21419fc8dc
                                                                                                    • Instruction ID: 2f33836ad5d7e3dfc7385443f83cc653aa619064e43b984ff55b4cadc004c9b1
                                                                                                    • Opcode Fuzzy Hash: dd38a8a86a9becd21e6a24dafbcc60e7c79994490d53087dfe731d21419fc8dc
                                                                                                    • Instruction Fuzzy Hash: 7EE18034B002099FDB19DF68D594AAEBBB2FF88318F144469E50AE7395DB35DC42CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6212c7f5d056ede6a222ac5d82ba43a5e7381d59eccd543154d41ef9780124d4
                                                                                                    • Instruction ID: abb21b08b68d1fe4b6061c307d59d921645648af9186beac4b99c2310f3de854
                                                                                                    • Opcode Fuzzy Hash: 6212c7f5d056ede6a222ac5d82ba43a5e7381d59eccd543154d41ef9780124d4
                                                                                                    • Instruction Fuzzy Hash: 22C1BE75B002098FDB18CF68D9807AEBBB2FF88318F208569E509EB395D775D845CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ba003623418a7afca1a2a47dc906ae73ef38418d39046c294c58e64b66c7c499
                                                                                                    • Instruction ID: dcf4fbc6fee742a36a2b2302a72190ba3906703ca7bcf13286b1ac61f0ca18cf
                                                                                                    • Opcode Fuzzy Hash: ba003623418a7afca1a2a47dc906ae73ef38418d39046c294c58e64b66c7c499
                                                                                                    • Instruction Fuzzy Hash: 96B16D70E006098FDF18CFA8D9957DDBBF1BF58314F148129D858EBA94EB749885CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8eda7584e91882d13597c02eeb3ea86b891db9984c0be5e894499fd26b5036bc
                                                                                                    • Instruction ID: f69f3bec28c171a1feb0dcf90a4c5fe3171c9b1756253c7e8ca07cd410c15c2d
                                                                                                    • Opcode Fuzzy Hash: 8eda7584e91882d13597c02eeb3ea86b891db9984c0be5e894499fd26b5036bc
                                                                                                    • Instruction Fuzzy Hash: 9B512470D002288FDB18CFA9D844B9DFBB1BF48314F14812AE859BB391D7789845CF95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b8962e3a1cb6da3e2346cd5643a2f574b6911c220b48b5aadcbca8fe5355ae6e
                                                                                                    • Instruction ID: c251b38aaad4b15b7e533d8b959a214df02066567081b4588b95ee8c9c69ea91
                                                                                                    • Opcode Fuzzy Hash: b8962e3a1cb6da3e2346cd5643a2f574b6911c220b48b5aadcbca8fe5355ae6e
                                                                                                    • Instruction Fuzzy Hash: 50510471D002288FDB18CFA9D888B9DFBB1BF48714F148129E859BB391D774A845CF95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8d310c277d8729fecf11ffc0bd02200421f503d6643ee032e07d2240b791a658
                                                                                                    • Instruction ID: 4a60416b31d2903c0a24e6dffa7b3bca388d73308836e2d5385559d1efed691a
                                                                                                    • Opcode Fuzzy Hash: 8d310c277d8729fecf11ffc0bd02200421f503d6643ee032e07d2240b791a658
                                                                                                    • Instruction Fuzzy Hash: B0510C3154124A9FC71AFB68F9A4A587BB6FB5630430499BAD0108F73EFB606989CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 589f4cb79dc9303b3ec0de58fdf41156874cab549524686da9ee197fb57f3eee
                                                                                                    • Instruction ID: 7a42be60bb3e036d44aeb286d7eefbf8bc3f95cf3d079a8f4a1b6e6384b39ca0
                                                                                                    • Opcode Fuzzy Hash: 589f4cb79dc9303b3ec0de58fdf41156874cab549524686da9ee197fb57f3eee
                                                                                                    • Instruction Fuzzy Hash: 3051EB3164124A9FC71AFB68F9A0A587BB6F7953043049979D0108F73DFF606989CF90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b05503cda0dc7035c7e9db9ca87d42d2ca99343d24c415b69c8a7b69275cedb3
                                                                                                    • Instruction ID: 2301ef2760b394c5c1d48727ae9cae8361211b0f0c5c21b942fc6594b881593d
                                                                                                    • Opcode Fuzzy Hash: b05503cda0dc7035c7e9db9ca87d42d2ca99343d24c415b69c8a7b69275cedb3
                                                                                                    • Instruction Fuzzy Hash: C7315235E106069BCB49DFA8D45469EB7B2FF89300F14851AE816EB754EB70ED47CB40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5b2bc0394405458b647b233abf70f658aba7267a7a63b0da6b4bd49d76197af4
                                                                                                    • Instruction ID: 5e55f99da5d1e885af0e3a77f9e71ff83e317a5cf9a0009c0ecd868f2e244eea
                                                                                                    • Opcode Fuzzy Hash: 5b2bc0394405458b647b233abf70f658aba7267a7a63b0da6b4bd49d76197af4
                                                                                                    • Instruction Fuzzy Hash: EF41E0B1D00349DFDB14CFA9C584ADEBFF5EF48314F24812AE419AB254DB35994ACB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e7c104782478824195df9eb89bdf3d063964be0d2eea32060fd06138791ba43b
                                                                                                    • Instruction ID: 65ef52f3e442ac18344270d90aeb823ed1de349b8e4dfd659dd16118c466390b
                                                                                                    • Opcode Fuzzy Hash: e7c104782478824195df9eb89bdf3d063964be0d2eea32060fd06138791ba43b
                                                                                                    • Instruction Fuzzy Hash: 88316035E1020A9BCB19DFA9D85469EBBB2FF89300F148519E816E7754EB70ED47CB40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d5167a8ff5d6ce623a95fd4687a693bf1767cdcdac33e4216ceb3b484d269740
                                                                                                    • Instruction ID: ac8b95946a122a45b1b836751b2fc6f98e8d313df838dadaa22f6e3f9955c737
                                                                                                    • Opcode Fuzzy Hash: d5167a8ff5d6ce623a95fd4687a693bf1767cdcdac33e4216ceb3b484d269740
                                                                                                    • Instruction Fuzzy Hash: C441EDB0D002499FDB14DFA9C584ADEBFF5FF48310F24802AE819AB254DB75A945CB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8b5a516f1239b518486a0a6535ddd982231e10df9617af62e79c7c2e8f20494d
                                                                                                    • Instruction ID: 3211096d833134c1c96b6d3c261aa44939e3ed5d783325e819f232bfdee3e67a
                                                                                                    • Opcode Fuzzy Hash: 8b5a516f1239b518486a0a6535ddd982231e10df9617af62e79c7c2e8f20494d
                                                                                                    • Instruction Fuzzy Hash: D931A031E0020A9BDB09CFA9D4846DEF7B2FF89304F14851AE405EB351DBB09846CB80
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 85c57010efdf8351b9d4dca155714fb37d6860af21f085ece6b472d6960a69f9
                                                                                                    • Instruction ID: 932c38b7d4725e53a5ad13b6a95b86ab0fc728a3fe46cffe085c4ca0e3e0c3a9
                                                                                                    • Opcode Fuzzy Hash: 85c57010efdf8351b9d4dca155714fb37d6860af21f085ece6b472d6960a69f9
                                                                                                    • Instruction Fuzzy Hash: 93219131E0020A9BDF09DFA9D5946DEF7B2FF89304F14851AE805EB341DB709846CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 69c39d010cdfecc75ebf28faf3ae673ce344a8b144074a9612e1990efea46c26
                                                                                                    • Instruction ID: 0b86c5ae66b8571afdad235b26099c6493831197393a9eb495cf24219450ced2
                                                                                                    • Opcode Fuzzy Hash: 69c39d010cdfecc75ebf28faf3ae673ce344a8b144074a9612e1990efea46c26
                                                                                                    • Instruction Fuzzy Hash: 76219235E0420A9BDB1DCFA8D4446DEB7B2AF89314F14861AE815B7340DB709946CB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7f0c6d34fe004f89f0271de8ac9df3b5671a2c5e07f24314c87a1f460e287993
                                                                                                    • Instruction ID: 014b2f042d40ee1fd71ec798400326ac2ddfda31315faac5fffdd0321cd3d9d4
                                                                                                    • Opcode Fuzzy Hash: 7f0c6d34fe004f89f0271de8ac9df3b5671a2c5e07f24314c87a1f460e287993
                                                                                                    • Instruction Fuzzy Hash: 8921B0382002469FDF27EB28E85876D7765EB41314F115A76D016CF36AEB74C8898B82
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3f7e00cc1cc5befd273f8e26a853c498cdb9e9b8d0d5bedafc49c02e5d4765f8
                                                                                                    • Instruction ID: f3154b0f1e57c53d923cf7c8668079351cf4d52fb5f4580209132dc5184cac32
                                                                                                    • Opcode Fuzzy Hash: 3f7e00cc1cc5befd273f8e26a853c498cdb9e9b8d0d5bedafc49c02e5d4765f8
                                                                                                    • Instruction Fuzzy Hash: 6D212D30700209CFCB58EF78C558AAD7BF6BF4D244B2444A9E406EB365DB769D41CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4724c7133b49f5a331f8982dd4dd276340a6aa7f83abea8605fa966cde4c4912
                                                                                                    • Instruction ID: 9dd9c7505b60f555694b8395aca121a4476b5aaadf1ea52075489e6f0e63900f
                                                                                                    • Opcode Fuzzy Hash: 4724c7133b49f5a331f8982dd4dd276340a6aa7f83abea8605fa966cde4c4912
                                                                                                    • Instruction Fuzzy Hash: 5621E470A00301AFDB3A666CE4587BD3761EB82325F11183AD426DF78ADF29C885C742
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2999677872.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_118d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 83ef23baf5aca27d92ea6b9d82c6832827150752d01cdee522728bc0b318c55d
                                                                                                    • Instruction ID: 5075f4c21df7637e5a3374d742b2b5bb0fd6a393ae3aad96678a5fb2235b9080
                                                                                                    • Opcode Fuzzy Hash: 83ef23baf5aca27d92ea6b9d82c6832827150752d01cdee522728bc0b318c55d
                                                                                                    • Instruction Fuzzy Hash: 0C212271604300DFDF19EF98E9C4B26BFA5EB84314F20C66DD80A4B296C33AD447CA62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 37d4f17089cbd714070028db60d935a92095c237c0f4b47ec0c4e79c4cd08c84
                                                                                                    • Instruction ID: 197e0d9e874dbb7f8ac4265d06cb01b1e24b441089df50230abcec53f333be54
                                                                                                    • Opcode Fuzzy Hash: 37d4f17089cbd714070028db60d935a92095c237c0f4b47ec0c4e79c4cd08c84
                                                                                                    • Instruction Fuzzy Hash: EF216235E0020A9BDF1DCFA9D8546DEF7B2AF89318F14862AE815F7340DB709946CB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1c3e4282fa7bbc6610c1b3606e27b51e4746cda19c6f6c77525ac286655c6df7
                                                                                                    • Instruction ID: 5dd0fd0ec1b7596d4d956641d52ecb98ad5f15cb0098bb087d902f507a8b931b
                                                                                                    • Opcode Fuzzy Hash: 1c3e4282fa7bbc6610c1b3606e27b51e4746cda19c6f6c77525ac286655c6df7
                                                                                                    • Instruction Fuzzy Hash: B6211A30B042199FDF1CEB78C5647AE7BF6AF89245F100868D506EB395EB369D40CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ce4b37a47afe91f86738382f367e25598baa78fa3c8e2d1ed3a7b6f66ed31d6f
                                                                                                    • Instruction ID: 87c07c745d9003526f9cfa1e117d6bff5080203b3343ae3b8027b14aab35f972
                                                                                                    • Opcode Fuzzy Hash: ce4b37a47afe91f86738382f367e25598baa78fa3c8e2d1ed3a7b6f66ed31d6f
                                                                                                    • Instruction Fuzzy Hash: BC21A5342002065FDF26EB2CE898B6D7765E744304F115A32D01ACF36EEB74D8898F92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d1333b83483e202c53851090e1bbb5e70570c02577493042fcf376e2d1e03d4d
                                                                                                    • Instruction ID: fa3734855f2486c1fcec454e343b092423f2243f79261162d7853483d17543f1
                                                                                                    • Opcode Fuzzy Hash: d1333b83483e202c53851090e1bbb5e70570c02577493042fcf376e2d1e03d4d
                                                                                                    • Instruction Fuzzy Hash: 8B215930B00215DFEB1CEB78C5647AE77F6AF89245F200469D506EB3A5EB368D40CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8d4df0576cdaadcafa26ac7265e4345d5575089e067d4e840dffc15294825769
                                                                                                    • Instruction ID: ebb379d01271fe5dea45a5a6cff8888a011fb7ff51d21a48710f86e7b29a9d74
                                                                                                    • Opcode Fuzzy Hash: 8d4df0576cdaadcafa26ac7265e4345d5575089e067d4e840dffc15294825769
                                                                                                    • Instruction Fuzzy Hash: 17210930700219CFDB58EB78C558AAE7BF6BF4D244F104468E406EB3A5EB369D40CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5c144e3b6ebf1e368781a6ba678c4621d82b6a9db11d48598761e2af6fe03a79
                                                                                                    • Instruction ID: 991768e3713e3f6dc60e1b34a613e672244072caa6e8a1fb0aeafb8859ec004c
                                                                                                    • Opcode Fuzzy Hash: 5c144e3b6ebf1e368781a6ba678c4621d82b6a9db11d48598761e2af6fe03a79
                                                                                                    • Instruction Fuzzy Hash: 43112330E013058FDF2E567CD40137E77A1EB8A220F11497AF002DF242EB64C8868BD2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4fce43c66aac3811d47e8b5af7150fb03685ddc4a326a391e96391077ee6bcfc
                                                                                                    • Instruction ID: accc9738eedc7f8ec5a6102d443a101d17363fde82cd69a022d7bb6afdbd2d9a
                                                                                                    • Opcode Fuzzy Hash: 4fce43c66aac3811d47e8b5af7150fb03685ddc4a326a391e96391077ee6bcfc
                                                                                                    • Instruction Fuzzy Hash: F511BF30F002098FDF2E9A7CD40532E76A1EB49210F118939E006DF346DB61DC858BD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a970cb2b686c0f2cb6243c62ceafdd02b7f7a4d24405a7f17ed1df71860d4e5c
                                                                                                    • Instruction ID: c34464b372a32fb7d96cafa97fdad27817c1797c732ff5c6aa7bead1e5a3569e
                                                                                                    • Opcode Fuzzy Hash: a970cb2b686c0f2cb6243c62ceafdd02b7f7a4d24405a7f17ed1df71860d4e5c
                                                                                                    • Instruction Fuzzy Hash: BE11B234A0020AEFDF45EB68F994ADDBBB5EB84304F10457AC408DB369EB31DE458B81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 34517c22d0f80796ed5a1d5d003cb6c71e21dcf9bc52ebf83c9c6616c7e3ea0d
                                                                                                    • Instruction ID: d257ca7f89278b197594193726d11d01da343fc74ba4dfe91e393c988f84063e
                                                                                                    • Opcode Fuzzy Hash: 34517c22d0f80796ed5a1d5d003cb6c71e21dcf9bc52ebf83c9c6616c7e3ea0d
                                                                                                    • Instruction Fuzzy Hash: 6F112A31A003159FDB69EFB8D4501AEBBF5EF58224F2504BED805E7245E739D8828BA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eb6c95867c0e7301f7159fbdbdf6d8a015d7a512b1f8262296feb4973eb77f6a
                                                                                                    • Instruction ID: 944fd5b694d9cb3190e397c0643904bfaa82425d09bb11f7e467fc9f6f2c40e0
                                                                                                    • Opcode Fuzzy Hash: eb6c95867c0e7301f7159fbdbdf6d8a015d7a512b1f8262296feb4973eb77f6a
                                                                                                    • Instruction Fuzzy Hash: 4C11C236F002119FDF15AB79980826E7BE5AB88224F11452AD919E7344EB34C906CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2999677872.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_118d000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                    • Instruction ID: 39721540dbbc6c72a01616421dccee5117b8e4d9e8ae0b4ede548a5f704d4717
                                                                                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                    • Instruction Fuzzy Hash: B911A975504380CFDB16DF58E584B16BBA2FB84214F24C6AAD8494B696C33AD40BCFA2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b8a11959b9d289709e54ad327be58563430f2b31d2240e063e90e39a161c2364
                                                                                                    • Instruction ID: 964891f3684fbcd040224fd39a40cf84ff0632c21793180e1ae9de400fda4200
                                                                                                    • Opcode Fuzzy Hash: b8a11959b9d289709e54ad327be58563430f2b31d2240e063e90e39a161c2364
                                                                                                    • Instruction Fuzzy Hash: 0A015231A002159FCF29EFB884541AEBBF5EF49214F2504BAE805E7305E735D9418BA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7e098093039093750054cd99209b358eed74c79542827349065e9c454f178643
                                                                                                    • Instruction ID: d390bcba199c7d799bfb293da26f70702ebbad1221e3d2b23a84048f0ab76c53
                                                                                                    • Opcode Fuzzy Hash: 7e098093039093750054cd99209b358eed74c79542827349065e9c454f178643
                                                                                                    • Instruction Fuzzy Hash: BEF0BB37A04150EFD72A9BA894901ACBFA1FEA9111B5D00D7D406DB215D735D542C752
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 48e4b5acd2d1ecef011a181d6d977df37ea21ad1772afeb5c8f010bb80fb1426
                                                                                                    • Instruction ID: 45f016777ed20017500e2041c2607cee612d43a0086639e01bf7ded5e64eefb6
                                                                                                    • Opcode Fuzzy Hash: 48e4b5acd2d1ecef011a181d6d977df37ea21ad1772afeb5c8f010bb80fb1426
                                                                                                    • Instruction Fuzzy Hash: 8EF0EC39700108CFC714EB78D598B6D77B2EF88719F114069E5069B3A4DB35AD43CB41
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.3000016181.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_11d0000_PO for fabric forecast.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1dc8d177d55886b6c9a855719d7ee608ce808093ab7deafd5825b0ba4268fd06
                                                                                                    • Instruction ID: 3e78c07274c0de7e9d565cb2ff2ba2ccd7ded766897d5197f4c976a671b8a41c
                                                                                                    • Opcode Fuzzy Hash: 1dc8d177d55886b6c9a855719d7ee608ce808093ab7deafd5825b0ba4268fd06
                                                                                                    • Instruction Fuzzy Hash: 62F03C3494020EEFCB45FBB8FA9099DBBB5EB40304F504679C4189B368EB316E499B81

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:11.7%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:252
                                                                                                    Total number of Limit Nodes:16
                                                                                                    execution_graph 31909 ae3f910 31910 ae3f913 31909->31910 31911 ae3f78a 31909->31911 31911->31909 31913 ae39220 31911->31913 31914 ae3f9b0 PostMessageW 31913->31914 31916 ae3fa1c 31914->31916 31916->31911 31806 93e5318 31807 93e534e 31806->31807 31808 93e540e 31807->31808 31810 93eeaa0 31807->31810 31811 93eeae3 31810->31811 31812 93eeb01 MonitorFromPoint 31811->31812 31813 93eeb32 31811->31813 31812->31813 31813->31808 31592 1177810 31593 117781b 31592->31593 31595 1177948 31592->31595 31596 117796d 31595->31596 31600 1177e50 31596->31600 31604 1177e60 31596->31604 31601 1177e87 31600->31601 31603 1177f64 31601->31603 31608 1177aac 31601->31608 31606 1177e87 31604->31606 31605 1177f64 31605->31605 31606->31605 31607 1177aac CreateActCtxA 31606->31607 31607->31605 31609 1178ef0 CreateActCtxA 31608->31609 31611 1178fb3 31609->31611 31611->31611 31917 117e560 31918 117e5a2 31917->31918 31919 117e5a8 GetModuleHandleW 31917->31919 31918->31919 31920 117e5d5 31919->31920 31612 ae3cca9 31613 ae3ccad 31612->31613 31614 ae3ceb2 31613->31614 31617 ae3e508 31613->31617 31635 ae3e4f9 31613->31635 31618 ae3e522 31617->31618 31627 ae3e546 31618->31627 31653 ae3eac3 31618->31653 31658 ae3e95d 31618->31658 31665 ae3f1dd 31618->31665 31669 ae3eb9e 31618->31669 31674 ae3f0df 31618->31674 31678 ae3ea5a 31618->31678 31683 ae3ed77 31618->31683 31688 ae3f017 31618->31688 31693 ae3e9ac 31618->31693 31698 ae3eb4c 31618->31698 31703 ae3e9cd 31618->31703 31708 ae3f029 31618->31708 31713 ae3efab 31618->31713 31718 ae3ea2b 31618->31718 31723 ae3eb84 31618->31723 31627->31614 31636 ae3e508 31635->31636 31637 ae3eac3 2 API calls 31636->31637 31638 ae3eb84 2 API calls 31636->31638 31639 ae3ea2b 2 API calls 31636->31639 31640 ae3efab 2 API calls 31636->31640 31641 ae3f029 2 API calls 31636->31641 31642 ae3e9cd 2 API calls 31636->31642 31643 ae3eb4c 2 API calls 31636->31643 31644 ae3e9ac 2 API calls 31636->31644 31645 ae3e546 31636->31645 31646 ae3f017 2 API calls 31636->31646 31647 ae3ed77 2 API calls 31636->31647 31648 ae3ea5a 2 API calls 31636->31648 31649 ae3f0df 2 API calls 31636->31649 31650 ae3eb9e 2 API calls 31636->31650 31651 ae3f1dd 2 API calls 31636->31651 31652 ae3e95d 4 API calls 31636->31652 31637->31645 31638->31645 31639->31645 31640->31645 31641->31645 31642->31645 31643->31645 31644->31645 31645->31614 31646->31645 31647->31645 31648->31645 31649->31645 31650->31645 31651->31645 31652->31645 31654 ae3ead0 31653->31654 31728 ae3c6e0 31654->31728 31732 ae3c6d9 31654->31732 31655 ae3f105 31736 ae3c878 31658->31736 31740 ae3c86c 31658->31740 31744 ae3c451 31665->31744 31748 ae3c458 31665->31748 31666 ae3f1f7 31670 ae3ebab 31669->31670 31752 ae3c5f0 31670->31752 31756 ae3c5e8 31670->31756 31671 ae3efed 31675 ae3f105 31674->31675 31676 ae3c6e0 ReadProcessMemory 31674->31676 31677 ae3c6d9 ReadProcessMemory 31674->31677 31676->31675 31677->31675 31679 ae3e9b5 31678->31679 31679->31678 31680 ae3ed40 31679->31680 31760 ae3c3a0 31679->31760 31764 ae3c3a8 31679->31764 31680->31627 31684 ae3e9b5 31683->31684 31685 ae3ed40 31684->31685 31686 ae3c3a0 ResumeThread 31684->31686 31687 ae3c3a8 ResumeThread 31684->31687 31685->31627 31686->31684 31687->31684 31689 ae3f249 31688->31689 31691 ae3c451 Wow64SetThreadContext 31689->31691 31692 ae3c458 Wow64SetThreadContext 31689->31692 31690 ae3f264 31690->31627 31691->31690 31692->31690 31694 ae3e9b5 31693->31694 31695 ae3ed40 31694->31695 31696 ae3c3a0 ResumeThread 31694->31696 31697 ae3c3a8 ResumeThread 31694->31697 31695->31627 31696->31694 31697->31694 31699 ae3eca0 31698->31699 31701 ae3c5f0 WriteProcessMemory 31699->31701 31702 ae3c5e8 WriteProcessMemory 31699->31702 31700 ae3f183 31701->31700 31702->31700 31704 ae3eccc 31703->31704 31768 ae3c530 31704->31768 31772 ae3c528 31704->31772 31705 ae3ecea 31709 ae3e9b5 31708->31709 31710 ae3ed40 31709->31710 31711 ae3c3a0 ResumeThread 31709->31711 31712 ae3c3a8 ResumeThread 31709->31712 31710->31627 31711->31709 31712->31709 31714 ae3efb1 31713->31714 31716 ae3c5f0 WriteProcessMemory 31714->31716 31717 ae3c5e8 WriteProcessMemory 31714->31717 31715 ae3efed 31716->31715 31717->31715 31719 ae3ea4e 31718->31719 31721 ae3c5f0 WriteProcessMemory 31719->31721 31722 ae3c5e8 WriteProcessMemory 31719->31722 31720 ae3ede5 31720->31627 31721->31720 31722->31720 31724 ae3ead0 31723->31724 31726 ae3c6e0 ReadProcessMemory 31724->31726 31727 ae3c6d9 ReadProcessMemory 31724->31727 31725 ae3f105 31726->31725 31727->31725 31729 ae3c72b ReadProcessMemory 31728->31729 31731 ae3c76f 31729->31731 31731->31655 31733 ae3c72b ReadProcessMemory 31732->31733 31735 ae3c76f 31733->31735 31735->31655 31737 ae3c901 31736->31737 31737->31737 31738 ae3ca66 CreateProcessA 31737->31738 31739 ae3cac3 31738->31739 31739->31739 31741 ae3c901 31740->31741 31741->31741 31742 ae3ca66 CreateProcessA 31741->31742 31743 ae3cac3 31742->31743 31743->31743 31745 ae3c49d Wow64SetThreadContext 31744->31745 31747 ae3c4e5 31745->31747 31747->31666 31749 ae3c49d Wow64SetThreadContext 31748->31749 31751 ae3c4e5 31749->31751 31751->31666 31753 ae3c638 WriteProcessMemory 31752->31753 31755 ae3c68f 31753->31755 31755->31671 31757 ae3c638 WriteProcessMemory 31756->31757 31759 ae3c68f 31757->31759 31759->31671 31761 ae3c3e8 ResumeThread 31760->31761 31763 ae3c419 31761->31763 31763->31679 31765 ae3c3e8 ResumeThread 31764->31765 31767 ae3c419 31765->31767 31767->31679 31769 ae3c570 VirtualAllocEx 31768->31769 31771 ae3c5ad 31769->31771 31771->31705 31773 ae3c570 VirtualAllocEx 31772->31773 31775 ae3c5ad 31773->31775 31775->31705 31776 93e5ee0 31777 93e5eeb 31776->31777 31780 93e5f00 31776->31780 31791 93e5ef0 31776->31791 31782 93e5f15 31780->31782 31781 93e5f9b 31789 93e5f00 GetCurrentThreadId 31781->31789 31790 93e5ef0 GetCurrentThreadId 31781->31790 31782->31781 31784 93e5fd0 31782->31784 31783 93e5fa5 31783->31777 31788 93e60d4 31784->31788 31802 93e50dc 31784->31802 31787 93e50dc GetCurrentThreadId 31787->31788 31788->31777 31789->31783 31790->31783 31793 93e5f00 31791->31793 31792 93e5f9b 31800 93e5f00 GetCurrentThreadId 31792->31800 31801 93e5ef0 GetCurrentThreadId 31792->31801 31793->31792 31795 93e5fd0 31793->31795 31794 93e5fa5 31794->31777 31796 93e50dc GetCurrentThreadId 31795->31796 31799 93e60d4 31795->31799 31797 93e60f8 31796->31797 31798 93e50dc GetCurrentThreadId 31797->31798 31798->31799 31799->31777 31800->31794 31801->31794 31803 93e50e7 31802->31803 31804 93e641f GetCurrentThreadId 31803->31804 31805 93e60f8 31803->31805 31804->31805 31805->31787 31814 93e6e90 31818 93e6eb8 31814->31818 31822 93e6ec8 31814->31822 31815 93e6eaf 31819 93e6ed1 31818->31819 31826 93e6f0e 31819->31826 31820 93e6ef6 31820->31815 31823 93e6ed1 31822->31823 31825 93e6f0e DrawTextExW 31823->31825 31824 93e6ef6 31824->31815 31825->31824 31827 93e6f4b 31826->31827 31828 93e6f3a 31826->31828 31829 93e6fd9 31827->31829 31832 93e7630 31827->31832 31837 93e7640 31827->31837 31828->31820 31829->31820 31833 93e7668 31832->31833 31834 93e776e 31833->31834 31842 93e7d58 31833->31842 31847 93e7d48 31833->31847 31834->31828 31838 93e7668 31837->31838 31839 93e776e 31838->31839 31840 93e7d58 DrawTextExW 31838->31840 31841 93e7d48 DrawTextExW 31838->31841 31839->31828 31840->31839 31841->31839 31843 93e7d6e 31842->31843 31852 93e8178 31843->31852 31856 93e8169 31843->31856 31844 93e7de4 31844->31834 31848 93e7d6e 31847->31848 31850 93e8178 DrawTextExW 31848->31850 31851 93e8169 DrawTextExW 31848->31851 31849 93e7de4 31849->31834 31850->31849 31851->31849 31861 93e81b8 31852->31861 31868 93e81a9 31852->31868 31853 93e8196 31853->31844 31857 93e8178 31856->31857 31859 93e81b8 DrawTextExW 31857->31859 31860 93e81a9 DrawTextExW 31857->31860 31858 93e8196 31858->31844 31859->31858 31860->31858 31862 93e81e9 31861->31862 31863 93e8216 31862->31863 31875 93e833c 31862->31875 31881 93e82e0 31862->31881 31886 93e8228 31862->31886 31892 93e8238 31862->31892 31863->31853 31869 93e81b8 31868->31869 31870 93e8216 31869->31870 31871 93e833c DrawTextExW 31869->31871 31872 93e8238 DrawTextExW 31869->31872 31873 93e8228 DrawTextExW 31869->31873 31874 93e82e0 DrawTextExW 31869->31874 31870->31853 31871->31870 31872->31870 31873->31870 31874->31870 31876 93e834a 31875->31876 31880 93e828c 31875->31880 31877 93e8303 31877->31863 31878 93e82e0 DrawTextExW 31878->31880 31880->31877 31880->31878 31897 93e7528 31880->31897 31884 93e828c 31881->31884 31882 93e8303 31882->31863 31883 93e82e0 DrawTextExW 31883->31881 31884->31882 31884->31883 31885 93e7528 DrawTextExW 31884->31885 31885->31884 31890 93e8238 31886->31890 31887 93e826e 31887->31863 31888 93e7528 DrawTextExW 31888->31890 31889 93e82e0 DrawTextExW 31889->31890 31890->31887 31890->31888 31890->31889 31891 93e8303 31890->31891 31891->31863 31895 93e8259 31892->31895 31893 93e7528 DrawTextExW 31893->31895 31894 93e82e0 DrawTextExW 31894->31895 31895->31893 31895->31894 31896 93e826e 31895->31896 31896->31863 31899 93e7533 31897->31899 31898 93ea299 31898->31880 31899->31898 31902 93eae08 31899->31902 31905 93e9c84 31902->31905 31906 93eae40 DrawTextExW 31905->31906 31908 93ea3ac 31906->31908 31908->31880
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843559304.000000000A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_a900000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3f2e84cd06e3f06ea442c8d808b80a799b20114954162e513e6a1f7f254404d2
                                                                                                    • Instruction ID: ecc211572b35002f9d9f973938bf4c7626113596423e6573d6d4428742c372c2
                                                                                                    • Opcode Fuzzy Hash: 3f2e84cd06e3f06ea442c8d808b80a799b20114954162e513e6a1f7f254404d2
                                                                                                    • Instruction Fuzzy Hash: 6922DB70B012048FDB18DBA8D550BAEB7FAAF89744F2444A9E146EB3E1DB35ED01CB51

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1430 ae3c86c-ae3c90d 1432 ae3c946-ae3c966 1430->1432 1433 ae3c90f-ae3c919 1430->1433 1440 ae3c968-ae3c972 1432->1440 1441 ae3c99f-ae3c9ce 1432->1441 1433->1432 1434 ae3c91b-ae3c91d 1433->1434 1435 ae3c940-ae3c943 1434->1435 1436 ae3c91f-ae3c929 1434->1436 1435->1432 1438 ae3c92b 1436->1438 1439 ae3c92d-ae3c93c 1436->1439 1438->1439 1439->1439 1442 ae3c93e 1439->1442 1440->1441 1443 ae3c974-ae3c976 1440->1443 1447 ae3c9d0-ae3c9da 1441->1447 1448 ae3ca07-ae3cac1 CreateProcessA 1441->1448 1442->1435 1445 ae3c999-ae3c99c 1443->1445 1446 ae3c978-ae3c982 1443->1446 1445->1441 1449 ae3c986-ae3c995 1446->1449 1450 ae3c984 1446->1450 1447->1448 1452 ae3c9dc-ae3c9de 1447->1452 1461 ae3cac3-ae3cac9 1448->1461 1462 ae3caca-ae3cb50 1448->1462 1449->1449 1451 ae3c997 1449->1451 1450->1449 1451->1445 1453 ae3ca01-ae3ca04 1452->1453 1454 ae3c9e0-ae3c9ea 1452->1454 1453->1448 1456 ae3c9ee-ae3c9fd 1454->1456 1457 ae3c9ec 1454->1457 1456->1456 1459 ae3c9ff 1456->1459 1457->1456 1459->1453 1461->1462 1472 ae3cb52-ae3cb56 1462->1472 1473 ae3cb60-ae3cb64 1462->1473 1472->1473 1474 ae3cb58 1472->1474 1475 ae3cb66-ae3cb6a 1473->1475 1476 ae3cb74-ae3cb78 1473->1476 1474->1473 1475->1476 1477 ae3cb6c 1475->1477 1478 ae3cb7a-ae3cb7e 1476->1478 1479 ae3cb88-ae3cb8c 1476->1479 1477->1476 1478->1479 1480 ae3cb80 1478->1480 1481 ae3cb9e-ae3cba5 1479->1481 1482 ae3cb8e-ae3cb94 1479->1482 1480->1479 1483 ae3cba7-ae3cbb6 1481->1483 1484 ae3cbbc 1481->1484 1482->1481 1483->1484 1486 ae3cbbd 1484->1486 1486->1486
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0AE3CAAE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: 533bb188f8965987b361021ed1dd2c666f120dcdab1fbefc7e7e859ccb5ff023
                                                                                                    • Instruction ID: 414a3156bfc798a0f59cd5029dde3d93820c3c89681b96b0b70bed9a52edbeb7
                                                                                                    • Opcode Fuzzy Hash: 533bb188f8965987b361021ed1dd2c666f120dcdab1fbefc7e7e859ccb5ff023
                                                                                                    • Instruction Fuzzy Hash: ECA1AE72D00219DFDB20CF68C8457EDBBB2BF88314F1585A9D849B7240DB759989CF91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1487 ae3c878-ae3c90d 1489 ae3c946-ae3c966 1487->1489 1490 ae3c90f-ae3c919 1487->1490 1497 ae3c968-ae3c972 1489->1497 1498 ae3c99f-ae3c9ce 1489->1498 1490->1489 1491 ae3c91b-ae3c91d 1490->1491 1492 ae3c940-ae3c943 1491->1492 1493 ae3c91f-ae3c929 1491->1493 1492->1489 1495 ae3c92b 1493->1495 1496 ae3c92d-ae3c93c 1493->1496 1495->1496 1496->1496 1499 ae3c93e 1496->1499 1497->1498 1500 ae3c974-ae3c976 1497->1500 1504 ae3c9d0-ae3c9da 1498->1504 1505 ae3ca07-ae3cac1 CreateProcessA 1498->1505 1499->1492 1502 ae3c999-ae3c99c 1500->1502 1503 ae3c978-ae3c982 1500->1503 1502->1498 1506 ae3c986-ae3c995 1503->1506 1507 ae3c984 1503->1507 1504->1505 1509 ae3c9dc-ae3c9de 1504->1509 1518 ae3cac3-ae3cac9 1505->1518 1519 ae3caca-ae3cb50 1505->1519 1506->1506 1508 ae3c997 1506->1508 1507->1506 1508->1502 1510 ae3ca01-ae3ca04 1509->1510 1511 ae3c9e0-ae3c9ea 1509->1511 1510->1505 1513 ae3c9ee-ae3c9fd 1511->1513 1514 ae3c9ec 1511->1514 1513->1513 1516 ae3c9ff 1513->1516 1514->1513 1516->1510 1518->1519 1529 ae3cb52-ae3cb56 1519->1529 1530 ae3cb60-ae3cb64 1519->1530 1529->1530 1531 ae3cb58 1529->1531 1532 ae3cb66-ae3cb6a 1530->1532 1533 ae3cb74-ae3cb78 1530->1533 1531->1530 1532->1533 1534 ae3cb6c 1532->1534 1535 ae3cb7a-ae3cb7e 1533->1535 1536 ae3cb88-ae3cb8c 1533->1536 1534->1533 1535->1536 1537 ae3cb80 1535->1537 1538 ae3cb9e-ae3cba5 1536->1538 1539 ae3cb8e-ae3cb94 1536->1539 1537->1536 1540 ae3cba7-ae3cbb6 1538->1540 1541 ae3cbbc 1538->1541 1539->1538 1540->1541 1543 ae3cbbd 1541->1543 1543->1543
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0AE3CAAE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: c5e8e854db624a64e2e0fd9f54a5223332e9c1391a7b6ce93dfaf9cf73e47c61
                                                                                                    • Instruction ID: afda0746e6f6913ca78ec17c3ff67b0f6c3cc0ce7444d3510dbfb9b94f4c71e9
                                                                                                    • Opcode Fuzzy Hash: c5e8e854db624a64e2e0fd9f54a5223332e9c1391a7b6ce93dfaf9cf73e47c61
                                                                                                    • Instruction Fuzzy Hash: 7A918E72D00219DFDB20CF69C8457EDBBB2BF88314F1585A9D849B7240DB749989CF91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1652 1178ee4-1178fb1 CreateActCtxA 1654 1178fb3-1178fb9 1652->1654 1655 1178fba-1179014 1652->1655 1654->1655 1662 1179016-1179019 1655->1662 1663 1179023-1179027 1655->1663 1662->1663 1664 1179029-1179035 1663->1664 1665 1179038 1663->1665 1664->1665 1666 1179039 1665->1666 1666->1666
                                                                                                    APIs
                                                                                                    • CreateActCtxA.KERNEL32(?), ref: 01178FA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1837214784.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1170000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: 18b402f68e479c11fd13d2a69298f6897be766f84148466addf5ba7de3247c26
                                                                                                    • Instruction ID: 93dbb019c965200d52952523618a272c6eb93f9f6f7733283a2d9534874eb464
                                                                                                    • Opcode Fuzzy Hash: 18b402f68e479c11fd13d2a69298f6897be766f84148466addf5ba7de3247c26
                                                                                                    • Instruction Fuzzy Hash: BA41F2B0C00619CFDB28CFA9C94479DBBF5BF49304F2080AAD408AB255DB756989CF91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1668 1177aac-1178fb1 CreateActCtxA 1671 1178fb3-1178fb9 1668->1671 1672 1178fba-1179014 1668->1672 1671->1672 1679 1179016-1179019 1672->1679 1680 1179023-1179027 1672->1680 1679->1680 1681 1179029-1179035 1680->1681 1682 1179038 1680->1682 1681->1682 1683 1179039 1682->1683 1683->1683
                                                                                                    APIs
                                                                                                    • CreateActCtxA.KERNEL32(?), ref: 01178FA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1837214784.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1170000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: f37d59b6c62dd71a250fdaaaf9098a597348954a262d1e9baf7ec28cd0c619bb
                                                                                                    • Instruction ID: 1a18192def7e0c751a5961eec7512a3d40a354c44cd1ea43273f64e5bc7bf679
                                                                                                    • Opcode Fuzzy Hash: f37d59b6c62dd71a250fdaaaf9098a597348954a262d1e9baf7ec28cd0c619bb
                                                                                                    • Instruction Fuzzy Hash: C041E4B0C0061DCFDB28CFA9C84479EBBF9BF48304F20806AD408AB255DB756989CF91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1685 ae3fa42-ae3fa45 1686 ae3f9e0 1685->1686 1687 ae3fa47-ae3fa49 1685->1687 1688 ae3f9e4-ae3fa1a PostMessageW 1686->1688 1687->1688 1689 ae3fa4b-ae3fa75 1687->1689 1692 ae3fa23-ae3fa37 1688->1692 1693 ae3fa1c-ae3fa22 1688->1693 1690 ae3fa77 1689->1690 1691 ae3fa7c-ae3fa8f 1689->1691 1690->1691 1696 ae3fa91-ae3fa9e 1691->1696 1697 ae3faa0-ae3fabb 1691->1697 1693->1692 1696->1697 1700 ae3fac5-ae3fad9 1697->1700 1701 ae3fabd 1697->1701 1703 ae3fa74-ae3fa7a 1700->1703 1704 ae3fadb-ae3fae1 1700->1704 1701->1700 1703->1691 1704->1691 1705 ae3fae3-ae3faf3 1704->1705 1706 ae3fb16-ae3fb19 1705->1706 1707 ae3faf5-ae3fb0c 1705->1707 1707->1706 1710 ae3fb0e-ae3fb13 1707->1710 1710->1706
                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0AE3FA0D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: c0ca81f76344fee8538be889aee1a797db832c769a864ff88d816238be62cd78
                                                                                                    • Instruction ID: 433bcc049295b09aad4c034f960f41b4556846b9da715d6b666fdb73bf6daf3e
                                                                                                    • Opcode Fuzzy Hash: c0ca81f76344fee8538be889aee1a797db832c769a864ff88d816238be62cd78
                                                                                                    • Instruction Fuzzy Hash: 5531EE72E042599FCB21CFA4D848BEEBFF0AF89304F15845AD841BB252C735A804CFA0

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1721 ae3c5e8-ae3c63e 1723 ae3c640-ae3c64c 1721->1723 1724 ae3c64e-ae3c68d WriteProcessMemory 1721->1724 1723->1724 1726 ae3c696-ae3c6c6 1724->1726 1727 ae3c68f-ae3c695 1724->1727 1727->1726
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0AE3C680
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 97283fddd0dda572e13fed31b997c0c035e77a7acad95dc016f5f02420f71180
                                                                                                    • Instruction ID: c0cb093e1febd10e1e613662ecdd6fb4f4a440a3875cf4594b471bf950d1901b
                                                                                                    • Opcode Fuzzy Hash: 97283fddd0dda572e13fed31b997c0c035e77a7acad95dc016f5f02420f71180
                                                                                                    • Instruction Fuzzy Hash: 442128719002599FDB10CFA9C885BEEBBF1BF88314F108429E959A7251C7789558CB94

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1711 93e9c84-93eae8c 1713 93eae8e-93eae94 1711->1713 1714 93eae97-93eaea6 1711->1714 1713->1714 1715 93eaeab-93eaee4 DrawTextExW 1714->1715 1716 93eaea8 1714->1716 1717 93eaeed-93eaf0a 1715->1717 1718 93eaee6-93eaeec 1715->1718 1716->1715 1718->1717
                                                                                                    APIs
                                                                                                    • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,093EAE25,?,?), ref: 093EAED7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843073745.00000000093E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 093E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_93e0000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DrawText
                                                                                                    • String ID:
                                                                                                    • API String ID: 2175133113-0
                                                                                                    • Opcode ID: 2385f644b70fdd556e01b1774c9cf7bea4e9813e9fedcb41a9e2177f212ada24
                                                                                                    • Instruction ID: f156f215ff408aa8b2dde22f8a036bac9dd5b2f1253ef847bcf70d12a2caffde
                                                                                                    • Opcode Fuzzy Hash: 2385f644b70fdd556e01b1774c9cf7bea4e9813e9fedcb41a9e2177f212ada24
                                                                                                    • Instruction Fuzzy Hash: 3A31E2B59002199FDB10CF9AD884AAEBBF4EB48320F14842AE919A7650D374A944CFA4

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1731 93eae39-93eae8c 1733 93eae8e-93eae94 1731->1733 1734 93eae97-93eaea6 1731->1734 1733->1734 1735 93eaeab-93eaee4 DrawTextExW 1734->1735 1736 93eaea8 1734->1736 1737 93eaeed-93eaf0a 1735->1737 1738 93eaee6-93eaeec 1735->1738 1736->1735 1738->1737
                                                                                                    APIs
                                                                                                    • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,093EAE25,?,?), ref: 093EAED7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843073745.00000000093E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 093E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_93e0000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DrawText
                                                                                                    • String ID:
                                                                                                    • API String ID: 2175133113-0
                                                                                                    • Opcode ID: 0e95e219cab9b29dd4380069347d288da2465e0136c8496a8ce4053641c00f44
                                                                                                    • Instruction ID: d4e9ceedd3e2c0bbe410239e45f253d32989c86366e4777588cc4683cfccf8ae
                                                                                                    • Opcode Fuzzy Hash: 0e95e219cab9b29dd4380069347d288da2465e0136c8496a8ce4053641c00f44
                                                                                                    • Instruction Fuzzy Hash: 9431CEB59002199FDB10CF9AD884AAEFBF4FF58320F14842AE819A7350D774A944CFA5
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0AE3C680
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 58258daad9585c83ef8e207eff0933ab9fd8b73372b6745e723bcf93b51b590c
                                                                                                    • Instruction ID: 136ff694760074b10806f68a4314d388f36fe8794c486d5073f7453e42db94bf
                                                                                                    • Opcode Fuzzy Hash: 58258daad9585c83ef8e207eff0933ab9fd8b73372b6745e723bcf93b51b590c
                                                                                                    • Instruction Fuzzy Hash: 47215AB19003099FCB10CFAAC845BDEBBF4FF48314F108429E558A7240C778A544CFA5
                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0AE3C760
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 9b21f64175a782282740e0a0e55fd163d7f05517fd49cc221c020e3ef2d5d500
                                                                                                    • Instruction ID: 4192cc9a0c7aa509a6190218017161ea2d8911cbc35ad2c40942ee70e099d716
                                                                                                    • Opcode Fuzzy Hash: 9b21f64175a782282740e0a0e55fd163d7f05517fd49cc221c020e3ef2d5d500
                                                                                                    • Instruction Fuzzy Hash: A2214AB1D003599FCB10CFA9C845AEEBBF1FF88310F108429E958A7250C7399544CFA4
                                                                                                    APIs
                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0AE3C4D6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThreadWow64
                                                                                                    • String ID:
                                                                                                    • API String ID: 983334009-0
                                                                                                    • Opcode ID: 5d9e36dc1cc5e90972e9ee15dd53398752c3e40cbe54f68d557ea9d278cb40ac
                                                                                                    • Instruction ID: 6da6b9c4e1786a063246c4d271f64970dbdf38fb184c1d6a753202cd44d3985d
                                                                                                    • Opcode Fuzzy Hash: 5d9e36dc1cc5e90972e9ee15dd53398752c3e40cbe54f68d557ea9d278cb40ac
                                                                                                    • Instruction Fuzzy Hash: 1D213AB1D002099FDB10DFAAC4457EEBBF4EF88314F14C42AD459A7251C7789948CFA5
                                                                                                    APIs
                                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 093EEB1F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843073745.00000000093E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 093E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_93e0000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FromMonitorPoint
                                                                                                    • String ID:
                                                                                                    • API String ID: 1566494148-0
                                                                                                    • Opcode ID: 0a23bdae72c1dbcf916c73805c9adff158305766364533f22201371af1676196
                                                                                                    • Instruction ID: af31f601012b18526a69dfb8502aee5e547d768096bb730535082565b5e4ecb5
                                                                                                    • Opcode Fuzzy Hash: 0a23bdae72c1dbcf916c73805c9adff158305766364533f22201371af1676196
                                                                                                    • Instruction Fuzzy Hash: C1214AB4A042099FDB20DFA9D809BAEFBF5FB48750F108019E955B7384C774A948CFA1
                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0AE3C760
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 97672276c603825c6cb32b391ff8c844fc7030713047daa4749758fe140f1629
                                                                                                    • Instruction ID: 6b2153a8c345967ed2fb7098bd42df7a97308f0db847534b786006d048f3a576
                                                                                                    • Opcode Fuzzy Hash: 97672276c603825c6cb32b391ff8c844fc7030713047daa4749758fe140f1629
                                                                                                    • Instruction Fuzzy Hash: 462116B18002599FDB10DFAAC885AEEBBF5FF48310F10842AE958A7250C738A554CBA5
                                                                                                    APIs
                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0AE3C4D6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThreadWow64
                                                                                                    • String ID:
                                                                                                    • API String ID: 983334009-0
                                                                                                    • Opcode ID: 4fa98ec03d8ede3ded12e29775567ec9595fbab327ae328877c84f25fbc0592b
                                                                                                    • Instruction ID: cc51103db76306555fe37e894495791c7a36345b74eaa84b378391de118d4a56
                                                                                                    • Opcode Fuzzy Hash: 4fa98ec03d8ede3ded12e29775567ec9595fbab327ae328877c84f25fbc0592b
                                                                                                    • Instruction Fuzzy Hash: D0211A71D002099FDB10DFAAC4457EEBBF4EF88314F14842AD559A7241D778A544CFA5
                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0AE3C59E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 062e0c111018076e60cbd379cdd38ad3aee534d585803ac77c65d3e4fb719be4
                                                                                                    • Instruction ID: 5c2a297025e715426beb61ddf08e85aafcc138e9dd6b866e4fdfedc510aa0973
                                                                                                    • Opcode Fuzzy Hash: 062e0c111018076e60cbd379cdd38ad3aee534d585803ac77c65d3e4fb719be4
                                                                                                    • Instruction Fuzzy Hash: EA1189B68002499FDF20DFAAC445BEEBFF1AF88314F208419E455A7250C735A544CFA4
                                                                                                    APIs
                                                                                                    • ResumeThread.KERNELBASE(?), ref: 0AE3C40A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: b26f91c6c4d4b3c6ab10dd66eb809235fb6a5b4c978fc1e471ca2e45c1ab879f
                                                                                                    • Instruction ID: 9d45b21a57470989098d9eb0ad56be58ec965c254ab5a8d7e36a4791e8b002d1
                                                                                                    • Opcode Fuzzy Hash: b26f91c6c4d4b3c6ab10dd66eb809235fb6a5b4c978fc1e471ca2e45c1ab879f
                                                                                                    • Instruction Fuzzy Hash: 5D1179B19002488EDB20DFA9C4457EEFFF1AB88314F208419C459A7250C775A848CF95
                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0AE3C59E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 4dd0eec8ad0b942f35c7639125b0478ff574c096f60ff54353d3c84e94ed70bb
                                                                                                    • Instruction ID: ba97fa27b3b399e60d45fcf3ac5def54ef281255b8980d9290521af0c0d76187
                                                                                                    • Opcode Fuzzy Hash: 4dd0eec8ad0b942f35c7639125b0478ff574c096f60ff54353d3c84e94ed70bb
                                                                                                    • Instruction Fuzzy Hash: 9E1167728002499FCB20DFAAC845BDFBFF5EF88324F20841AE519A7250C735A544CFA4
                                                                                                    APIs
                                                                                                    • ResumeThread.KERNELBASE(?), ref: 0AE3C40A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 925acef38dd565bdfd5a4afd8b707ff54898400796910c02ecb5069d8d70c344
                                                                                                    • Instruction ID: 3aebd057b8b0d80f615c3870c85b28d7bc79074e172cdc57de49aa69bcb0019c
                                                                                                    • Opcode Fuzzy Hash: 925acef38dd565bdfd5a4afd8b707ff54898400796910c02ecb5069d8d70c344
                                                                                                    • Instruction Fuzzy Hash: A1113AB1D002498FDB20DFAAC4457EEFBF4EB88324F208419D459A7250C779A944CF95
                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0AE3FA0D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: c4a01f93898c481aef864a91f662fe4c9b41d044919d2044ffe8da03749e51c7
                                                                                                    • Instruction ID: 1843da40dd965347bdfeee95c86c95a96096907e70e67794c2520b7eda13560e
                                                                                                    • Opcode Fuzzy Hash: c4a01f93898c481aef864a91f662fe4c9b41d044919d2044ffe8da03749e51c7
                                                                                                    • Instruction Fuzzy Hash: 3F1103B6800349DFDB20DF9AD449BDEFBF8EB48324F10845AE959A7210C375A944CFA5
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0117E5C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1837214784.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1170000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 4139908857-0
                                                                                                    • Opcode ID: 4ddea5ddffd933b8ac12740570b21fd784413c438096c8f181e3beb306d3b723
                                                                                                    • Instruction ID: 30726c2e1b85803effee53b2c28a7e39e2598f93d6b7ac10b4c61a5d4b4b1975
                                                                                                    • Opcode Fuzzy Hash: 4ddea5ddffd933b8ac12740570b21fd784413c438096c8f181e3beb306d3b723
                                                                                                    • Instruction Fuzzy Hash: B81110B5C003498FDB24CF9AC444ADEFBF4AB88324F10846AD418B7710D379A545CFA5
                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0AE3FA0D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843806315.000000000AE30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE30000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_ae30000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 205c26c56eb8e022a7e0c2bb132dd669019402054992889b4e4c7e3053c36e81
                                                                                                    • Instruction ID: 6edfa70ef9c92fb159022c02b5617098b538172785cf1fd7f57131ea9cd94c9e
                                                                                                    • Opcode Fuzzy Hash: 205c26c56eb8e022a7e0c2bb132dd669019402054992889b4e4c7e3053c36e81
                                                                                                    • Instruction Fuzzy Hash: F51103B6900349DFDB20DF99D489BDEFBF4EB48314F10845AE558A7210C375A984CFA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1836257744.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_e6d000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 300f546cf80d1c5c65ef6f1099ddafbc31d7dffb26d72027e8eedb13fad4cb94
                                                                                                    • Instruction ID: 750fde1fcdcd7eafea7ca938aa9d1004667b26decea3e3802fe6c6de153d47ce
                                                                                                    • Opcode Fuzzy Hash: 300f546cf80d1c5c65ef6f1099ddafbc31d7dffb26d72027e8eedb13fad4cb94
                                                                                                    • Instruction Fuzzy Hash: 36214571A88240DFCB01DF14EDC0B26BF65FB98368F60C169E80A5B656C336D856CAA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1836306477.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_e7d000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fbd253ea985ce1dea066d43e13718cff94c9d6fdd54f287e9c459073cf4f303a
                                                                                                    • Instruction ID: 7abb06dc384d5a8af82410d465da350f4373f08b3648c1c18f37a021501af43d
                                                                                                    • Opcode Fuzzy Hash: fbd253ea985ce1dea066d43e13718cff94c9d6fdd54f287e9c459073cf4f303a
                                                                                                    • Instruction Fuzzy Hash: 52210371608240DFCB01DF14D980B26BBB5FF84318F20C569D80D5B266C336D846CA61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1836306477.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_e7d000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8fd879728cee75d2d19583dc71f73a27be9a4b4ba08b13ae62b4549327fdf601
                                                                                                    • Instruction ID: 8228f9a64fa4b98f3bd07996d9def377df76e9f7b881f99c848fba1eb2bd3116
                                                                                                    • Opcode Fuzzy Hash: 8fd879728cee75d2d19583dc71f73a27be9a4b4ba08b13ae62b4549327fdf601
                                                                                                    • Instruction Fuzzy Hash: A721FF75608200DFCB14DF24DD84B26BBB6EF88318F24D56DE80E5B296C33AD847CA61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1836306477.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_e7d000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b91278cd592affa8a3f213cc961fdcb6ce276e256415386ec003d105bbf5dc7a
                                                                                                    • Instruction ID: 87ca3bf79007df115a9c4390f8105591ac4b297ea15b24854f0e8fa41485644e
                                                                                                    • Opcode Fuzzy Hash: b91278cd592affa8a3f213cc961fdcb6ce276e256415386ec003d105bbf5dc7a
                                                                                                    • Instruction Fuzzy Hash: 832141755093808FD712CF24D994715BF71EF46214F28C5EAD8498B6A7C33A980ACB62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843559304.000000000A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_a900000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9fe500b99d5c7aeb6eb5c5c0c56eb64c79147c1e23fc532f6e8774d4a5b60478
                                                                                                    • Instruction ID: 77db376056684f5e52ec78fa3ff27e1525fffed736caa3219e6c61e51548d1d3
                                                                                                    • Opcode Fuzzy Hash: 9fe500b99d5c7aeb6eb5c5c0c56eb64c79147c1e23fc532f6e8774d4a5b60478
                                                                                                    • Instruction Fuzzy Hash: FB11D671E0121ADFCB28DF69C444BAEF7F1AF88310F1584A9D518AB3A1DB349941CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843559304.000000000A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_a900000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 74da142f69d97bbf0c579c78c1ccf909de6b9cffa8841ab2819843bdb04acbe7
                                                                                                    • Instruction ID: effc8d5b96ca8ce4cd47f07c2f8d433fd21c719d333d6f16f89311c289816ad2
                                                                                                    • Opcode Fuzzy Hash: 74da142f69d97bbf0c579c78c1ccf909de6b9cffa8841ab2819843bdb04acbe7
                                                                                                    • Instruction Fuzzy Hash: A411F9B0E01216CFDB18DF69C044BAEB7F2AF89200F15C4A9D818AB3A1D7759902CF40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1836257744.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_e6d000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                    • Instruction ID: 23f653437d003b9b371214d226ee3245d9242dcd0dd51a3b748d859f55e9c99d
                                                                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                    • Instruction Fuzzy Hash: E411D676944280CFCB15CF14D9C4B16BF71FB94328F24C5A9D8454B656C336D456CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1836306477.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_e7d000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                    • Instruction ID: 41d8439b2e8b229abd053ed7476f8840f8e31150386bbac91c028f4913d233ab
                                                                                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                    • Instruction Fuzzy Hash: 2011AC75508280DFCB01CF50C9C4B15BB71FB84318F24C6A9D8494B266C33AD81ACB61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843559304.000000000A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_a900000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bab54297e44a0b24b2952a944fdcfcf7bd43325497943541dbe42a2ac5fc5173
                                                                                                    • Instruction ID: 789285e1a0e0d66fc4f7d22fb776f5c2c4244fbd3ff7bca23fe6cd2550101e95
                                                                                                    • Opcode Fuzzy Hash: bab54297e44a0b24b2952a944fdcfcf7bd43325497943541dbe42a2ac5fc5173
                                                                                                    • Instruction Fuzzy Hash: 27E04FB0D4424A9EDB40EF7CA5417AEBFF26B89780F108D6AC094E6241EBB541018F40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.1843559304.000000000A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_a900000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 64b6792889d079d904bc906fdbb82902b115bb8a9ead4603abe6766c6aa40764
                                                                                                    • Instruction ID: a5c82df9f2b0e1ba915d224e63157ad8692295256c7d5f6450940e15d17eaad5
                                                                                                    • Opcode Fuzzy Hash: 64b6792889d079d904bc906fdbb82902b115bb8a9ead4603abe6766c6aa40764
                                                                                                    • Instruction Fuzzy Hash: 13D012B1D4030DAEDB40EFB9954175FBBF46B44680F108975C014F3241EB7442008F91

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:11.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:19
                                                                                                    Total number of Limit Nodes:4
                                                                                                    execution_graph 28225 2d20848 28226 2d2084e 28225->28226 28227 2d2091b 28226->28227 28229 2d21380 28226->28229 28231 2d21396 28229->28231 28230 2d21480 28230->28226 28231->28230 28233 2d27090 28231->28233 28234 2d2709a 28233->28234 28235 2d270b4 28234->28235 28238 62ed388 28234->28238 28243 62ed398 28234->28243 28235->28231 28240 62ed3ad 28238->28240 28239 62ed5c2 28239->28235 28240->28239 28241 62ed5e8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 28240->28241 28242 62ed5d8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 28240->28242 28241->28240 28242->28240 28245 62ed3ad 28243->28245 28244 62ed5c2 28244->28235 28245->28244 28246 62ed5e8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 28245->28246 28247 62ed5d8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 28245->28247 28246->28245 28247->28245
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4cc5cbff82f517e1a0c888edd320c6c80b4b45370bf567d1df22591da0184ee0
                                                                                                    • Instruction ID: 659cde8bc44886671562d6fbfbefedb4d7fdc12a19a5271632ba58ae89454f1f
                                                                                                    • Opcode Fuzzy Hash: 4cc5cbff82f517e1a0c888edd320c6c80b4b45370bf567d1df22591da0184ee0
                                                                                                    • Instruction Fuzzy Hash: 3553EA31D10B1A8ACB51EF68C89069DF7B1FF99300F11D79AE45877221EB70AAD5CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ec4f8f9cfde9eb39a37bdf7dc0a7652fd20060b554a53999d3d6e3820d306fe4
                                                                                                    • Instruction ID: 2269f935ecdd2d0530d819c9ff42ced1a6dc2b3b48efea71cca88ca34dbe8058
                                                                                                    • Opcode Fuzzy Hash: ec4f8f9cfde9eb39a37bdf7dc0a7652fd20060b554a53999d3d6e3820d306fe4
                                                                                                    • Instruction Fuzzy Hash: F8333E31D107198ECB11EF68C8906ADF7B1FF99304F55C79AE458A7221EB70AAC5CB81
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm
                                                                                                    • API String ID: 0-2312107965
                                                                                                    • Opcode ID: 5238900d0d0117d7f84530667b3d22d70208b377765026c16d9bfe1964d833db
                                                                                                    • Instruction ID: 6fb7ec076799c7dd02b934e357e26fd9f1060a5cdfc2a19ce60acb1474bc2e2e
                                                                                                    • Opcode Fuzzy Hash: 5238900d0d0117d7f84530667b3d22d70208b377765026c16d9bfe1964d833db
                                                                                                    • Instruction Fuzzy Hash: B8915070E002298FDF14CFA9D98579DBBF2AF98318F148129E815A7394DB749889CF81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d63117831ee3d235e9f7996e3d27c360fbfa8eafa32e1c1959198868cb80068f
                                                                                                    • Instruction ID: 6936285c1a5f7520181840f54dad69974814e486a9ffb251fd4a0da2fd523ca3
                                                                                                    • Opcode Fuzzy Hash: d63117831ee3d235e9f7996e3d27c360fbfa8eafa32e1c1959198868cb80068f
                                                                                                    • Instruction Fuzzy Hash: 01328F35B002148FDB14DF68D9A4BAEBBB2EF88318F248469E809DB395DB31DC45CB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9a0841a3a744b02a817cd1b44b9d74e42f0c1cd3ba98d576cabec671a8a71c0b
                                                                                                    • Instruction ID: 91958473833661a2f4be161fc3919feb435aa5af970eb215262fec1f618bd5c3
                                                                                                    • Opcode Fuzzy Hash: 9a0841a3a744b02a817cd1b44b9d74e42f0c1cd3ba98d576cabec671a8a71c0b
                                                                                                    • Instruction Fuzzy Hash: C4B15E70E002298FDF10CFA9D89179DBBF2EF98318F149129D819E7394EB749849CB91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2257 2d24810-2d2489c 2260 2d248e6-2d248e8 2257->2260 2261 2d2489e-2d248a9 2257->2261 2262 2d248ea-2d24902 2260->2262 2261->2260 2263 2d248ab-2d248b7 2261->2263 2270 2d24904-2d2490f 2262->2270 2271 2d2494c-2d2494e 2262->2271 2264 2d248da-2d248e4 2263->2264 2265 2d248b9-2d248c3 2263->2265 2264->2262 2267 2d248c7-2d248d6 2265->2267 2268 2d248c5 2265->2268 2267->2267 2269 2d248d8 2267->2269 2268->2267 2269->2264 2270->2271 2272 2d24911-2d2491d 2270->2272 2273 2d24950-2d24995 2271->2273 2274 2d24940-2d2494a 2272->2274 2275 2d2491f-2d24929 2272->2275 2281 2d2499b-2d249a9 2273->2281 2274->2273 2277 2d2492b 2275->2277 2278 2d2492d-2d2493c 2275->2278 2277->2278 2278->2278 2279 2d2493e 2278->2279 2279->2274 2282 2d249b2-2d24a0f 2281->2282 2283 2d249ab-2d249b1 2281->2283 2290 2d24a11-2d24a15 2282->2290 2291 2d24a1f-2d24a23 2282->2291 2283->2282 2290->2291 2292 2d24a17-2d24a1a call 2d20ab8 2290->2292 2293 2d24a33-2d24a37 2291->2293 2294 2d24a25-2d24a29 2291->2294 2292->2291 2297 2d24a47-2d24a4b 2293->2297 2298 2d24a39-2d24a3d 2293->2298 2294->2293 2296 2d24a2b-2d24a2e call 2d20ab8 2294->2296 2296->2293 2301 2d24a5b 2297->2301 2302 2d24a4d-2d24a51 2297->2302 2298->2297 2300 2d24a3f 2298->2300 2300->2297 2304 2d24a5c 2301->2304 2302->2301 2303 2d24a53 2302->2303 2303->2301 2304->2304
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm$\VXm
                                                                                                    • API String ID: 0-3652994748
                                                                                                    • Opcode ID: 9afb2051166cca8ea1c64c059d7c25fbf220c1b0e77ba0eeb47208383cd47b0b
                                                                                                    • Instruction ID: 0a1729db652db8e7f73758d2c9237e5a0ade6ae0d428aade0eed9d0c6e63310c
                                                                                                    • Opcode Fuzzy Hash: 9afb2051166cca8ea1c64c059d7c25fbf220c1b0e77ba0eeb47208383cd47b0b
                                                                                                    • Instruction Fuzzy Hash: 5F716EB0E04259CFDB14CFA9C98079EBBF2BF98318F148129E815A7354EB749849CF95

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2305 2d24804-2d2489c 2308 2d248e6-2d248e8 2305->2308 2309 2d2489e-2d248a9 2305->2309 2310 2d248ea-2d24902 2308->2310 2309->2308 2311 2d248ab-2d248b7 2309->2311 2318 2d24904-2d2490f 2310->2318 2319 2d2494c-2d2494e 2310->2319 2312 2d248da-2d248e4 2311->2312 2313 2d248b9-2d248c3 2311->2313 2312->2310 2315 2d248c7-2d248d6 2313->2315 2316 2d248c5 2313->2316 2315->2315 2317 2d248d8 2315->2317 2316->2315 2317->2312 2318->2319 2320 2d24911-2d2491d 2318->2320 2321 2d24950-2d24962 2319->2321 2322 2d24940-2d2494a 2320->2322 2323 2d2491f-2d24929 2320->2323 2328 2d24969-2d24995 2321->2328 2322->2321 2325 2d2492b 2323->2325 2326 2d2492d-2d2493c 2323->2326 2325->2326 2326->2326 2327 2d2493e 2326->2327 2327->2322 2329 2d2499b-2d249a9 2328->2329 2330 2d249b2-2d24a0f 2329->2330 2331 2d249ab-2d249b1 2329->2331 2338 2d24a11-2d24a15 2330->2338 2339 2d24a1f-2d24a23 2330->2339 2331->2330 2338->2339 2340 2d24a17-2d24a1a call 2d20ab8 2338->2340 2341 2d24a33-2d24a37 2339->2341 2342 2d24a25-2d24a29 2339->2342 2340->2339 2345 2d24a47-2d24a4b 2341->2345 2346 2d24a39-2d24a3d 2341->2346 2342->2341 2344 2d24a2b-2d24a2e call 2d20ab8 2342->2344 2344->2341 2349 2d24a5b 2345->2349 2350 2d24a4d-2d24a51 2345->2350 2346->2345 2348 2d24a3f 2346->2348 2348->2345 2352 2d24a5c 2349->2352 2350->2349 2351 2d24a53 2350->2351 2351->2349 2352->2352
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm$\VXm
                                                                                                    • API String ID: 0-3652994748
                                                                                                    • Opcode ID: b4ccc1e5ebbd5b37239b17aa4de218c64ecff75917e1c4dc35f09a53d04a4634
                                                                                                    • Instruction ID: 40a3c16321ec19afbe70a853d7af520d7620aa9d13bc353833629f92e6de394f
                                                                                                    • Opcode Fuzzy Hash: b4ccc1e5ebbd5b37239b17aa4de218c64ecff75917e1c4dc35f09a53d04a4634
                                                                                                    • Instruction Fuzzy Hash: E4716BB0E04259CFDB14CFA9C98479EBBF1BF58318F148129E819A7354EB349849CF95

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2420 2d26ed8-2d26f42 call 2d26c40 2429 2d26f44-2d26f5d call 2d26764 2420->2429 2430 2d26f5e-2d26f8c 2420->2430 2436 2d26f8e-2d26f91 2430->2436 2437 2d26f93-2d26fc8 2436->2437 2438 2d26fcd-2d26fd0 2436->2438 2437->2438 2439 2d26fd2 2438->2439 2440 2d26fe0-2d26fe3 2438->2440 2464 2d26fd2 call 2d280f1 2439->2464 2465 2d26fd2 call 2d27918 2439->2465 2466 2d26fd2 call 2d27908 2439->2466 2441 2d27016-2d27019 2440->2441 2442 2d26fe5-2d26ff9 2440->2442 2444 2d2701b-2d27022 2441->2444 2445 2d2702d-2d2702f 2441->2445 2452 2d26ffb-2d26ffd 2442->2452 2453 2d26fff 2442->2453 2443 2d26fd8-2d26fdb 2443->2440 2447 2d270eb-2d270f1 2444->2447 2448 2d27028 2444->2448 2449 2d27031 2445->2449 2450 2d27036-2d27039 2445->2450 2448->2445 2449->2450 2450->2436 2451 2d2703f-2d2704e 2450->2451 2456 2d27050-2d27053 2451->2456 2457 2d27078-2d2708e 2451->2457 2454 2d27002-2d27011 2452->2454 2453->2454 2454->2441 2460 2d2705b-2d27076 2456->2460 2457->2447 2460->2456 2460->2457 2464->2443 2465->2443 2466->2443
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q$LR^q
                                                                                                    • API String ID: 0-4089051495
                                                                                                    • Opcode ID: 48304e06b8401d19de7f60034f106e4dd5691bdf844c026ef72bf4e3e7d799b8
                                                                                                    • Instruction ID: 23354704b8e4f6bb7ce18cfd463361d11fbbfa2b8b39f67c25c51708e490f9f1
                                                                                                    • Opcode Fuzzy Hash: 48304e06b8401d19de7f60034f106e4dd5691bdf844c026ef72bf4e3e7d799b8
                                                                                                    • Instruction Fuzzy Hash: F751D430E102159FDB19DF79D5547AEBBB6EF89304F208429E405EB380DB719C4ACB91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 3083 62ee1a8-62ee1b3 3084 62ee1dd-62ee1fc call 62ed364 3083->3084 3085 62ee1b5-62ee1dc call 62ed358 3083->3085 3091 62ee1fe-62ee201 3084->3091 3092 62ee202-62ee252 3084->3092 3097 62ee254-62ee261 3092->3097 3098 62ee2d1-62ee2f4 GlobalMemoryStatusEx 3092->3098 3103 62ee267-62ee277 3097->3103 3104 62ee263-62ee266 3097->3104 3099 62ee2fd-62ee325 3098->3099 3100 62ee2f6-62ee2fc 3098->3100 3100->3099 3103->3098
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3012801926.00000000062E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_62e0000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6e97fc2c006ec5fb2571521ecbb700d647a7c4f408ca7b5aff26d1fefb09c96d
                                                                                                    • Instruction ID: 5f22d7fe585c892f32969a5cf06205f5eebd901f8df2ef66a51a9b1a3bd29ae7
                                                                                                    • Opcode Fuzzy Hash: 6e97fc2c006ec5fb2571521ecbb700d647a7c4f408ca7b5aff26d1fefb09c96d
                                                                                                    • Instruction Fuzzy Hash: 7C31BB32E143964FCB108F7998143DDBFA5AFC5210F0585BBD844D7682DB749884C3C1
                                                                                                    APIs
                                                                                                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,062EE1FA), ref: 062EE2E7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3012801926.00000000062E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_62e0000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalMemoryStatus
                                                                                                    • String ID:
                                                                                                    • API String ID: 1890195054-0
                                                                                                    • Opcode ID: 8cb245594c8531e0ec6f5aacf68db7205961a9846f5d537d298bc872a294f5cc
                                                                                                    • Instruction ID: 800a2733ea57560275b351d2c9f7eecb94c0549337d050297601567571c7ca6b
                                                                                                    • Opcode Fuzzy Hash: 8cb245594c8531e0ec6f5aacf68db7205961a9846f5d537d298bc872a294f5cc
                                                                                                    • Instruction Fuzzy Hash: 411136B1C0025A9BCB10DF9AC444B9EFBF4AB08320F11816AD858B7250D378A940CFE5
                                                                                                    APIs
                                                                                                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,062EE1FA), ref: 062EE2E7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3012801926.00000000062E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_62e0000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalMemoryStatus
                                                                                                    • String ID:
                                                                                                    • API String ID: 1890195054-0
                                                                                                    • Opcode ID: 2063d5554d9fce48649961e83d5fe24c78de451f0c582174b1375a40e1ad87e4
                                                                                                    • Instruction ID: 3a825fc4832f637d08f181d9e18747a7e955a4c6046b43ef1e8876017371a49d
                                                                                                    • Opcode Fuzzy Hash: 2063d5554d9fce48649961e83d5fe24c78de451f0c582174b1375a40e1ad87e4
                                                                                                    • Instruction Fuzzy Hash: 851114B6C0026ADBCB10CFAAC5447DEFBB4AF08320F15816AD818B7650D378A940CFA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \VXm
                                                                                                    • API String ID: 0-2312107965
                                                                                                    • Opcode ID: fff97f628e8633370a56143b1712ce6c274bcb9243f6551dfccc124ce323fb21
                                                                                                    • Instruction ID: 29c465ac8c7d0eda37b5a00e24ce4e29ef04aabb029ced103fbd0cd1c2988cd7
                                                                                                    • Opcode Fuzzy Hash: fff97f628e8633370a56143b1712ce6c274bcb9243f6551dfccc124ce323fb21
                                                                                                    • Instruction Fuzzy Hash: 94913EB0E00229CFDB54CFA8D9857DDBBF1AF58318F148129E819A7394DB749889CF91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q
                                                                                                    • API String ID: 0-2549759414
                                                                                                    • Opcode ID: 3fb0eeaa1cf966fdb2a1f7a0e360924befc97a1550c3ed36240c8495aa897487
                                                                                                    • Instruction ID: 81187cc1412f7cb3ef3a42fac545a9eb9a895ab44c400001182a80b445c6f72d
                                                                                                    • Opcode Fuzzy Hash: 3fb0eeaa1cf966fdb2a1f7a0e360924befc97a1550c3ed36240c8495aa897487
                                                                                                    • Instruction Fuzzy Hash: EB3124307042108FCB16AB34D6686AF7BF2AF89708F144869E006DB785DF79DC4ACB91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q
                                                                                                    • API String ID: 0-2549759414
                                                                                                    • Opcode ID: 94ea27ced6c977527de39eaaa07b7b32f904f9fe036c006eb66c44b64565262e
                                                                                                    • Instruction ID: e5ea50db424537bd561b4171ff1f8d86420e9902b76c9fbc2dcf9327d668d418
                                                                                                    • Opcode Fuzzy Hash: 94ea27ced6c977527de39eaaa07b7b32f904f9fe036c006eb66c44b64565262e
                                                                                                    • Instruction Fuzzy Hash: DF3104307042158FDB15AB34D66466F77F2AF88748F104829D006DB388DF79DC4ACBA1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q
                                                                                                    • API String ID: 0-2625958711
                                                                                                    • Opcode ID: 17b4ade5cd9d1177dcbd17c29a55d27b46cd95d44828d3e8630dfab1cdc23c85
                                                                                                    • Instruction ID: 3087747a9b7ff27298a93279fed0be547172c44788f3ae8ddb863228df739db7
                                                                                                    • Opcode Fuzzy Hash: 17b4ade5cd9d1177dcbd17c29a55d27b46cd95d44828d3e8630dfab1cdc23c85
                                                                                                    • Instruction Fuzzy Hash: 36316B31E102199BEF25CEA5D54479EF7B5FF89308F208525E805EB380EB71AD4ACB91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q
                                                                                                    • API String ID: 0-2625958711
                                                                                                    • Opcode ID: 1eed86416a90b1004c6ec9602a01b4803eb0d3c3ca20166d3a9a5b38c894ac48
                                                                                                    • Instruction ID: 431ef00d1b55d02ca417ee01be3699a1e8761be1b52396cd6818368c75f051a2
                                                                                                    • Opcode Fuzzy Hash: 1eed86416a90b1004c6ec9602a01b4803eb0d3c3ca20166d3a9a5b38c894ac48
                                                                                                    • Instruction Fuzzy Hash: 1C0122317042405FD705AB78D42A3AD7FA2EF8A304F0448AED089CB791DE3598468B92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2fe6ac302e7f4d9ac74ec224ec624667337e29862b23ce192744c6359ea28395
                                                                                                    • Instruction ID: 4ab3186ec02cca7f1933658bdb81c2395c9a5da68821643ee772db3a3b2cd02b
                                                                                                    • Opcode Fuzzy Hash: 2fe6ac302e7f4d9ac74ec224ec624667337e29862b23ce192744c6359ea28395
                                                                                                    • Instruction Fuzzy Hash: 13128E307042029FDB25AB38E899768B7A2FF89358B604939E405CB355CF75EC5ADF90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ba7962240e6944db13e973faa923735f119a6b3fd273f581dce7b35e776cddf9
                                                                                                    • Instruction ID: f8de9c11da18c51502357d056e94c62001385e66fc8b8d6387555f18f55457d1
                                                                                                    • Opcode Fuzzy Hash: ba7962240e6944db13e973faa923735f119a6b3fd273f581dce7b35e776cddf9
                                                                                                    • Instruction Fuzzy Hash: DD127E307042029FDB25AB38E899768B7A2FF89358B604939E405CB355CF75EC5ADF90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e17469b413d1b5b77c8c18f4fa26ca55fd806ebebcb60cd32baf826a4d1bebcd
                                                                                                    • Instruction ID: 707cce2111a77133213917e0e475649c8a35b2336c368fb188cc0c5039785083
                                                                                                    • Opcode Fuzzy Hash: e17469b413d1b5b77c8c18f4fa26ca55fd806ebebcb60cd32baf826a4d1bebcd
                                                                                                    • Instruction Fuzzy Hash: 7BA14CB0E00229CFDB10CFA8D89579DBBF1EF58318F149129D859E7394EB749889CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 712c8f70299a1843b4a108ac75d2324068f65ddd38c532072fa44900c24c485b
                                                                                                    • Instruction ID: b738aecb7a823435b37fd9399e5e0def0e21efa2bcc9efcb9f199dbcc77d97e6
                                                                                                    • Opcode Fuzzy Hash: 712c8f70299a1843b4a108ac75d2324068f65ddd38c532072fa44900c24c485b
                                                                                                    • Instruction Fuzzy Hash: B3917234B042549FCB14DF68D5A4AADBBF2EF88315F248469E805E73A4DB31EC46CB50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6172965e9cb27dfb511ca8d8191406847bfc7aa10bb3504029209d0a809f46db
                                                                                                    • Instruction ID: dbe6edcc994efced31f58ccfb845c49591f00f5d0e4cd03aa0b5e83355d4a1a7
                                                                                                    • Opcode Fuzzy Hash: 6172965e9cb27dfb511ca8d8191406847bfc7aa10bb3504029209d0a809f46db
                                                                                                    • Instruction Fuzzy Hash: 5851F2B4D003288FDB14CFA9C884B9DBBB5FF58318F148129E819AB355D774A849CF95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: cce77279519037bb8555abcf0e4901264a92d561fc4e1bec6fff11cdeb003437
                                                                                                    • Instruction ID: cf6756c2f04ca0eb2662ff2ac04d2766bce71cf6b98b3ad799d07d6647b058fd
                                                                                                    • Opcode Fuzzy Hash: cce77279519037bb8555abcf0e4901264a92d561fc4e1bec6fff11cdeb003437
                                                                                                    • Instruction Fuzzy Hash: 9251F2B0D003288FDB14CFA9C884B9DBBB5FF58718F148119E819AB350D774A849CF95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: faea65a88076f4cdc6101dddde92ab574e90245509510e25875ccecfd60d81c6
                                                                                                    • Instruction ID: 8e6180a5717ea84218aa5a8def19e30c8363f76c0481f750170f2878f8c15804
                                                                                                    • Opcode Fuzzy Hash: faea65a88076f4cdc6101dddde92ab574e90245509510e25875ccecfd60d81c6
                                                                                                    • Instruction Fuzzy Hash: CE51093121114ADFC71AEB7CF9A4A547FA1F796308744997AD0048B73EEB707989CB60
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8bed2685d0a10fd1afb1986328b0240a3582f5fb940e662482ffec1091ffe718
                                                                                                    • Instruction ID: 1471ddf60439f2f30c2a755f343f1372b105d032161a051557df949daa15b616
                                                                                                    • Opcode Fuzzy Hash: 8bed2685d0a10fd1afb1986328b0240a3582f5fb940e662482ffec1091ffe718
                                                                                                    • Instruction Fuzzy Hash: 8551D83121114ADFC71AEB7CF9A49547FB1F795308344997AD1008B73EEB607989CBA0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bd8427c2c10b470b513a091cb76866670c92cce83332cea560100d145af873f7
                                                                                                    • Instruction ID: a7bf1e36266654c4cfbfd797e34806a6e2391d33e34a619a5ea033f3cba9e8c2
                                                                                                    • Opcode Fuzzy Hash: bd8427c2c10b470b513a091cb76866670c92cce83332cea560100d145af873f7
                                                                                                    • Instruction Fuzzy Hash: A8315E35E102199FCB19DFA4D854A9EBBF6FF89304F148919E806E7750DB70AC46CB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 79271849836aa533aa3f4b02cb2d209d8c02f325b64a1ec92353126b0b0aa54c
                                                                                                    • Instruction ID: fcf23031d17e035fea3e70ed8dc634a82a3cfbdd19579c2fd36ede83c297c136
                                                                                                    • Opcode Fuzzy Hash: 79271849836aa533aa3f4b02cb2d209d8c02f325b64a1ec92353126b0b0aa54c
                                                                                                    • Instruction Fuzzy Hash: 6E41FFB0D003599FDB10CFA9C984ADEBFB5FF48314F148029E819AB254DB75A949CF90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 957f6319b9ab6405ed5b9ef5dafd144e9a7953540f819f90782320344de4e723
                                                                                                    • Instruction ID: 37417fed0dc5449398db8cccae7d62de4ba0d2f1c0a159ae349a05342a2c8145
                                                                                                    • Opcode Fuzzy Hash: 957f6319b9ab6405ed5b9ef5dafd144e9a7953540f819f90782320344de4e723
                                                                                                    • Instruction Fuzzy Hash: C1317E306002298FDB19EB38D964AAE73B2FF5934CF604568D905AB394DB36DC45CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 950758b9aef375ee6682daf9f4141ec5dd1be6542039d9c3b748f42aadaa029c
                                                                                                    • Instruction ID: 92cc47f2c6a0e03491fbb078389e19e0b83a9039254936327f097c3ed0fcae36
                                                                                                    • Opcode Fuzzy Hash: 950758b9aef375ee6682daf9f4141ec5dd1be6542039d9c3b748f42aadaa029c
                                                                                                    • Instruction Fuzzy Hash: 68314B35E002199FCB19DFA4D494A9EB7B6BF89304F14C929E806E7750DB70AC46CB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 957e0268fafbe7f34eb21aab812f66475a67879b408cd4755c2c5f6d96063d6e
                                                                                                    • Instruction ID: 4302ef336a2fae7a21645a2beebb69f6c2a6d37a6da7e8afef3f7b4c8dcad096
                                                                                                    • Opcode Fuzzy Hash: 957e0268fafbe7f34eb21aab812f66475a67879b408cd4755c2c5f6d96063d6e
                                                                                                    • Instruction Fuzzy Hash: AB41EEB0D00259DFDB10DFA9C584ADEBFB5FF58314F108029E819AB254DB75A949CB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f6f5151b45b74a888326d22ebef07ec9b89c74ac7b68249a06ab46ffaeeb69cd
                                                                                                    • Instruction ID: 0f07330ed252c8a394f5cc4dcdea5123d48c8186218fdf9d097717fd05adbb7b
                                                                                                    • Opcode Fuzzy Hash: f6f5151b45b74a888326d22ebef07ec9b89c74ac7b68249a06ab46ffaeeb69cd
                                                                                                    • Instruction Fuzzy Hash: 5D3160306002288FDB19EB38D564AAE77F2BB5934CF604568D405AB398DB36DC05CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2ecaf06b5f878b03158ca7bd6a1078c962d680666055b7d1d5ac51c7ebcb247a
                                                                                                    • Instruction ID: d17ac15ccf7bb8c6a0962cc8074362c5d7e7447cadd48d3fcb42733b9804051c
                                                                                                    • Opcode Fuzzy Hash: 2ecaf06b5f878b03158ca7bd6a1078c962d680666055b7d1d5ac51c7ebcb247a
                                                                                                    • Instruction Fuzzy Hash: D6319F31E0021A9BCF05DFA4D5A46DEF7B2FF89308F648519E805AB340DB71AC4ACB80
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8d631bd4ee437f6909c2dd18ecafce5bf0f1ebeaf771ba13cbb27f8cd7134077
                                                                                                    • Instruction ID: f1b9cc599b520f5abd2628e7f157c6dba11ca10e637272fa0c885ff9afaad8e9
                                                                                                    • Opcode Fuzzy Hash: 8d631bd4ee437f6909c2dd18ecafce5bf0f1ebeaf771ba13cbb27f8cd7134077
                                                                                                    • Instruction Fuzzy Hash: E7215E31E0021A9BDF05DFA5D5A06DEF7B2BF89318F64C519E805AB350DB71AC4ACB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c4282cb2e5d1f42b775a80d4b2379340a04e139b3fbeb7da8cbefed0907b1e0e
                                                                                                    • Instruction ID: 9809883222a3945a16f9884f2773f7ed817812e80da8a98df06eac2106ac909e
                                                                                                    • Opcode Fuzzy Hash: c4282cb2e5d1f42b775a80d4b2379340a04e139b3fbeb7da8cbefed0907b1e0e
                                                                                                    • Instruction Fuzzy Hash: 2221C5345101568FDF22EB7CE898B693725FB5531CF148A36D00AC736AEB24DC89CB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 79a4f9f401a236a82dfcf0565a1de869aac6b75f2601521a52f77344a7914949
                                                                                                    • Instruction ID: 8a92c5e39fabefa81341e9149bc6c7f03f205e228a1b1bc9e93f04461cfd5e8b
                                                                                                    • Opcode Fuzzy Hash: 79a4f9f401a236a82dfcf0565a1de869aac6b75f2601521a52f77344a7914949
                                                                                                    • Instruction Fuzzy Hash: F821A131E002268BDF19CFA5D4646DEBBB2EF99304F24861AE815BB341DB709C4ACB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2999752825.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_11ad000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dc679d49e5b27e3d3d8e532bb82e3876e5a6e4adb4b751ef0ba07c6cc12d2f51
                                                                                                    • Instruction ID: 79f4f3310c218cf2f7159953a14e972ab1b9e2875357a2e40001ff9995943964
                                                                                                    • Opcode Fuzzy Hash: dc679d49e5b27e3d3d8e532bb82e3876e5a6e4adb4b751ef0ba07c6cc12d2f51
                                                                                                    • Instruction Fuzzy Hash: 73216778184600DFCF19DF58EAC0B26BF61FB84314F60C56DD8094B656C336C407CA62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 53e92b932cd7057bf16d099a23df26be8fc63e7a5d444c133b42f9e1f923f851
                                                                                                    • Instruction ID: 67202c4aee25fabefce373f0d357e9aa501ae3489e445a2b1a2ad7706ebe93cc
                                                                                                    • Opcode Fuzzy Hash: 53e92b932cd7057bf16d099a23df26be8fc63e7a5d444c133b42f9e1f923f851
                                                                                                    • Instruction Fuzzy Hash: 082120706002104BDF352B68E46832C3A61EF1331DF14482AE04EC73D2DB25CC8AC782
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5351970dc678a57722565080bd943a2fe964a4c90b0c987a6ec4ca5658e596a0
                                                                                                    • Instruction ID: 5b58fd8275b9a0741697b133c2bf4cd4d2df09c34d584b28446450d3e65fff33
                                                                                                    • Opcode Fuzzy Hash: 5351970dc678a57722565080bd943a2fe964a4c90b0c987a6ec4ca5658e596a0
                                                                                                    • Instruction Fuzzy Hash: B8218030E0022A9BCF19CFA5D8646DEB7B2AF99314F60851AE815B7340DB709C4ACB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 94c3ba6cda87facf430c20eb8037a7439754cbf919999da52271515683fa329a
                                                                                                    • Instruction ID: c93cf6f954c31f4f497f3410339c386ed5a0988435ab11835d7c8f507feb7aaa
                                                                                                    • Opcode Fuzzy Hash: 94c3ba6cda87facf430c20eb8037a7439754cbf919999da52271515683fa329a
                                                                                                    • Instruction Fuzzy Hash: 442160307002258FDB14EB78C564BAE77F6AB99349F204468D40AFB355DB32DD44CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 04294a3731c066315bcb4815179c887f1238cf6563a3af04992fb4949dd5f5b0
                                                                                                    • Instruction ID: c04d07ccc04d4cb1c1c1d15da3985cde3e7625ab651fa05b3131bf9e3767af4f
                                                                                                    • Opcode Fuzzy Hash: 04294a3731c066315bcb4815179c887f1238cf6563a3af04992fb4949dd5f5b0
                                                                                                    • Instruction Fuzzy Hash: 2F212B34600215CFDB18DB78D968BAE77F1EF4D308B2048A8E406EB3A5DB359D44CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2e9df088fef623a71c14e8c7febfb7b3ba326d79b03376ab1e1b2160b0058fd3
                                                                                                    • Instruction ID: 96de27e014b51c7c6edb7873ce7f8adfdf79128ec9d79e01bc551243ff0b9c25
                                                                                                    • Opcode Fuzzy Hash: 2e9df088fef623a71c14e8c7febfb7b3ba326d79b03376ab1e1b2160b0058fd3
                                                                                                    • Instruction Fuzzy Hash: 752154346101168FDF21E76CE898B697755FB5531CF108A36D40AC736ADB24DC89CB92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f06a912ffb1d0fc8b7f15dc72f7b33f999355e53e4bf54473d0eb81fe946a870
                                                                                                    • Instruction ID: 0f58147ca9b6260243a9af44ac7ea9c59182e1912a1893620de0d1318b934b25
                                                                                                    • Opcode Fuzzy Hash: f06a912ffb1d0fc8b7f15dc72f7b33f999355e53e4bf54473d0eb81fe946a870
                                                                                                    • Instruction Fuzzy Hash: 4621EB30600219CFDB18DB79D958BAE77F1AB8D748F204468E406EB3A5DB36DD04CBA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 505699b3705060e80483a6ce528bef1eb3bfe51a4b9c73facae3cbd3b69f0e5a
                                                                                                    • Instruction ID: 6e5278ab3f84201771afa3b40a8b74a9f301d1d41aa1db6d85a6f5ed42e271b5
                                                                                                    • Opcode Fuzzy Hash: 505699b3705060e80483a6ce528bef1eb3bfe51a4b9c73facae3cbd3b69f0e5a
                                                                                                    • Instruction Fuzzy Hash: 92214A30B04225CFDB14EB78C5647AE77F2AB59249F204468D40AEB395DB36DD44CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2999752825.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_11ad000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9a23a3cc52baeac2cc78fc212fb339c6aaf4e9a1c402bfe0e31e1adbd43c6d74
                                                                                                    • Instruction ID: 3ede24d68286c1751833cbacb1b9313b1db6f5eb89f3d5a4c812a8a658becbf2
                                                                                                    • Opcode Fuzzy Hash: 9a23a3cc52baeac2cc78fc212fb339c6aaf4e9a1c402bfe0e31e1adbd43c6d74
                                                                                                    • Instruction Fuzzy Hash: EE21C2754487809FCB07CF24D994711BF71EF46214F28C5DAD8498F6A7C33A980ACB62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5b0c5989aacb658fa587c1a8e7c8224b06f36916cadc51f77d495823d73b21e2
                                                                                                    • Instruction ID: 96bb9d66d7415a62c29f15634075db8a0e2b7c5fac1586342393f9445745279b
                                                                                                    • Opcode Fuzzy Hash: 5b0c5989aacb658fa587c1a8e7c8224b06f36916cadc51f77d495823d73b21e2
                                                                                                    • Instruction Fuzzy Hash: 9111C131B102288FDF246A78D44433FB2A1EBB531AF108A39E006DB350DB61DC89CBD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ca56221e66ab6bf6248003eb9f1ac645a7f81a4678d8544b83f9cebd6e3849cd
                                                                                                    • Instruction ID: 785db63d136013214ee43779ab680e07563ffb50666b61bea0c448b4abf88eee
                                                                                                    • Opcode Fuzzy Hash: ca56221e66ab6bf6248003eb9f1ac645a7f81a4678d8544b83f9cebd6e3849cd
                                                                                                    • Instruction Fuzzy Hash: 2211C131A042244FDF2566B8A41437BB6A1EB7631EF144A79E042DB381DB65DC89CBC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ee602531588de93fa8e6f11f6cb52339d6ae33be17498900b6eb16f0a22b6087
                                                                                                    • Instruction ID: f2029dc90d9ae418fd40632c5110a279cbd5071a4b055dd3f6d993a11cf97fde
                                                                                                    • Opcode Fuzzy Hash: ee602531588de93fa8e6f11f6cb52339d6ae33be17498900b6eb16f0a22b6087
                                                                                                    • Instruction Fuzzy Hash: 11115134600209EFDB01EBA8EA54A9DBBB5EF44308F104679D405D7369DB31AE49DB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ab024f669991ebe19787b6cf68e7f8346a0fce4898fc5535dc965516c7beb265
                                                                                                    • Instruction ID: e51c6f09cdc2d10bcb9b185c026481472cb0bf7c5f97ad3d077f743eae74dea3
                                                                                                    • Opcode Fuzzy Hash: ab024f669991ebe19787b6cf68e7f8346a0fce4898fc5535dc965516c7beb265
                                                                                                    • Instruction Fuzzy Hash: 47110232B002149BCB20AB79A85C65F7FE5FB88668F004429E949C3381EB30CC42C792
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1ba91b67716e68287a90ce3bd5695dde6c9af4937d803bf998645365f6ad6621
                                                                                                    • Instruction ID: 3d7bc19cb3cb714fff44d91855af108aa61a76b38b06d7804ea82295390dd761
                                                                                                    • Opcode Fuzzy Hash: 1ba91b67716e68287a90ce3bd5695dde6c9af4937d803bf998645365f6ad6621
                                                                                                    • Instruction Fuzzy Hash: A0113031E002249FCF11EFB894502AE7BF6EB68219F1444BAD809E7346E735DD46CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 971741da5d16eeafc7edd6d8c32621033786fa19265e3ac8c95417ba5ca92f6b
                                                                                                    • Instruction ID: bff89bc707f27e2493e16eb9738f1f5026acefb87744c504bf657baf8018f0a4
                                                                                                    • Opcode Fuzzy Hash: 971741da5d16eeafc7edd6d8c32621033786fa19265e3ac8c95417ba5ca92f6b
                                                                                                    • Instruction Fuzzy Hash: 7601E131E002259FCF21EFB9845029EBBF6EB58219F1444BAD809E7345E735DD46CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ad8fe1c97ef5f86b0a3634dce849e1e4327a2697427b9a3e5fb2638bd6ea39ce
                                                                                                    • Instruction ID: 0dca3e8a454f755bb1e21e6c86f1aad838f2990c8a33cebea0a718967659b4ed
                                                                                                    • Opcode Fuzzy Hash: ad8fe1c97ef5f86b0a3634dce849e1e4327a2697427b9a3e5fb2638bd6ea39ce
                                                                                                    • Instruction Fuzzy Hash: E2F0F632A041708FDB228BA484902ACBB75EEB8219B5880E7C84ADB756D721DC4ACB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3efa47ee3832bf83833a45904f731346f2a613547ed6885531b7b0a29f4bfe48
                                                                                                    • Instruction ID: a06d513f39b8505cf904533300272b0b83ec5cf575dfbe802830070bcebe4b00
                                                                                                    • Opcode Fuzzy Hash: 3efa47ee3832bf83833a45904f731346f2a613547ed6885531b7b0a29f4bfe48
                                                                                                    • Instruction Fuzzy Hash: 42F0C439B00118CFD714DB74D5A8A6DB7B2EF88719F1040A9E6069B3A4DF35AD42CB41
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.3001394229.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_2d20000_QzRJbgyEhZjA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 97901bcd6a2f2dba7ef24848554c35d0dd64d81ab0b5738b686b9c868ca708f8
                                                                                                    • Instruction ID: 9f85ff73c0448cd51908305f163c957b48aca6aa2030a6592091da89e3e423d8
                                                                                                    • Opcode Fuzzy Hash: 97901bcd6a2f2dba7ef24848554c35d0dd64d81ab0b5738b686b9c868ca708f8
                                                                                                    • Instruction Fuzzy Hash: 3DF0313494010DFFCB05FBA8FA9099DB7B5FF40308F504679C40497269DB316E498B91